Create your Office 365 migration plan by first assessing your environment with these PowerShell scripts.
PowerShell uses a concept called pipelining to combine two or more cmdlets to perform a cohesive task. The PowerShell pipeline combines singularly useful cmdlets together to process data. Used intelligently, the pipeline is a great way to process data through a series of steps to automate common administrative operations. Mastering the pipeline, or at least becoming comfortable with pipelining cmdlets, is an essential skill for anyone using PowerShell to manage Microsoft 365 tenants.
Many Microsoft Graph API permissions are available to developers. The Graph works on a least permission model, so what permissions to use.
Exchange Online administrators can change mailbox permissions without their owners knowing. We explain how to notify owners when permissions change.
In this article, we explain how to create new Microsoft 365 accounts with PowerShell using the Azure AD and Microsoft Graph PowerShell SDK.
The Microsoft Graph SDK for PowerShell is a good way to execute Microsoft Graph API queries from PowerShell scripts. In this article, we explain how to use the SDK with Azure Automation.
As many organizations adapt legacy scripts to use app authentication instead of traditional service account credentials, security can be compromised if certain risks are overlooked. While app secrets can be great for testing code, there’s a reason they have an enforced expiry date - the longer a secret exists in production, the higher the risk it will become compromised. The methods described in this article will help build a good foundation for app authentication while keeping security top of mind when creating or updating automation scripts.
Attack Simulations are Microsoft’s foray into a crowded field of competitors who provide a service that trains users to recognize dangerous email with simulated Phishing or malware-infested messages. Microsoft has continually added features and functionality since they released Attack Simulations, including additional simulation types, different payloads, custom payloads, customizable training and more. The most recent upgrades are RBAC permissions and end user notifications. These two additions to Attack Simulation Training are a great incentive to deploy and adopt this functionality, as End User communications are the key enhancement that make this feature worthwhile for an organization.
Azure Automation runbooks can run Exchange Online PowerShell code on sandbox machines. Is this a good way of getting work done?
With an increasing number of companies moving to Intune for endpoint management, more applications must be deployed via Intune to ensure users can access the applications they need to perform job functions. This article walks you through the steps to deploy a legacy application and guides you through converting an .exe installer into an import-ready format for Intune.