I have started a series on Zero Trust Security model in Microsoft 365. This is being published on Petri. You can read it here. Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to…
Day: 13/07/2021
Reply All Storm Protection settings in Microsoft 365
Reply All storms have been a nuisance that was left unchecked for a long time. Microsoft has finally decided to crack down on this rather reprehensible aspect of Exchange. In this article, you will be introduced to the Reply All Storm Protection component of Microsoft 365. You will also learn the tenant-level settings that you…
Understanding the Microsoft 365 Threat protection status report
The Microsoft 365 Threat protection status report is an amalgamation of several Exchange Online security reports that contain information about malicious messages detected by Exchange Online Protection (EOP) and Office 365 ATP. This article gives an overview of the Threat protection status report. You may read it here.
How to set out of office messages in Microsoft Teams
Microsoft rolled out a new feature that allows you to set out of office messages in Microsoft Teams. In this article, I explain how you can create out of office messages, and I will show how you how to turn on and off out of office messages in the desktop and the web version of…
Sending email using a proxy address in Microsoft 365
The ability to send emails using a proxy address was a feature that was highly anticipated for Microsoft 365 (formerly Office 365). Microsoft originally planned to release this feature later this year, in June. However, probably because of the high demand from customers, users can already send emails via their proxies from both Outlook and…
Taking action in Microsoft 365 Threat Explorer
In my last post, I outlined how you can identify malicious items in Microsoft 36 Threat Explorer. In today’s post, we’ll take a look at the possible actions you can take once you have found suspicious emails. You can read the post here.
Microsoft 365 Threat Explorer: Finding malicious emails
In this first post of two, you will be introduced to Microsoft 365 Threat Explorer. In my first post, I will explain how you can find malicious emails. In a follow-up post, I will outline the different options you have to neutralize suspicious items. You can read the article here.
If email are missing in Office 365: Message tracing via Powershell
In this post, I will show you how to trace emails in Microsoft 365 with PowerShell if users complain that they didn’t receive certain emails.This is the location of the post.
If emails are missing in Office 365: Message tracing in Microsoft 365
If emails are missing in Microsoft 365 (formerly Office 365), that is, if users complain that they didn’t receive emails, you need to know how to trace these messages. In this article, I will explain the various options available in the Microsoft 365 portal to troubleshoot email delivery email issues. In my next post, I…
Demystifying PowerShell Dates, DateTime and Formatting
I wrote this post on ATA. PowerShell can do a lot of things and, like any good programming language, it can do just about anything you want with dates. Using the PowerShell Get-Date command and other techniques, you can find today’s date, tomorrow’s date, format dates, and a whole lot more. In this article, you’re…