Migrating Intune Devices in an Office 365 Tenant-To-Tenant Project
When performing an Office 365 Tenant-To-Tenant Migration, the goal should be to migrate everything possible with minimal user disruption, including devices
When performing an Office 365 Tenant-To-Tenant Migration, the goal should be to migrate everything possible with minimal user disruption, including devices
If you've migrated to Exchange Online, make sure you stop publishing your Exchange Servers to the internet. After a standard Hybrid migration, you still might be reliant on Exchange Server and in this article you can find out why and how to move remaining web services to Microsoft 365.
It's often helpful when security researchers like Guardicore shed light on flaws in Microsoft Exchange - however, the Autodiscover protocol isn't flawed in the way they describe. Even though the issue is hard to replicate, it shouldn't distract from the work you need to do to protect your organization from the underlying reason why people want your credentials.
The recent 10th anniversary of the launch of Office 365 brought some questions about the demarcation between Office 365 and Microsoft 365. For instance, do I have an Office 365 tenant or is it a Microsoft 365 tenant? Is a feature part of Microsoft 365 or does it belong to Office 365? And why does Microsoft insist on calling its desktop Office apps Microsoft 365 Apps for enterprise? Welcome to the bizarre world of branding, and that’s before throwing Windows 365 into the mix.
Launched on June 28, 2011, Office 365 is ten years old. The effect of Microsoft's cloud office system has been profound on corporate IT. In this article, we reflect on some of the major developments relating to Office 365 since 2011.
As we grow ever-closer to the end of 2019, Steve reflects back on some of the biggest announcements of the year, and predictions for the future.
If you want to moderate the content which is being distributed in your environment, then read on for MVP Gustavo Velez's guide on how to implement this.
In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.
Attackers can bypass your third-party gateway systems delivering spam and malicious content. Office 365 architect Tony Akers writes on how to fix this.
Steve's written a script for the new update in the Microsoft Teams PowerShell module for easier access to information in the Office 365 tenant.
In this two-part blog, MVP Vasil Michev does a deep-dive into Privileged Access Management in Office 365 and a guide on how to practice this effectively.
MVP Vasil Michev discusses the further improvements made to the access reviews feature for admin roles in Azure AD/Office 365.