Microsoft Brings Improvements to DMARC
It's time to armor up for battle with Microsoft's DMARC. In this article, Damian Scoles talks about new improvements to DMARC and how you can use them to protect against email attacks.
It's time to armor up for battle with Microsoft's DMARC. In this article, Damian Scoles talks about new improvements to DMARC and how you can use them to protect against email attacks.
Creating a Planner plan from a template allows a team working on a project to start working with the plan without creating a new plan from scratch. This is particularly useful when the same basic plan is used on multiple occasions. In this article, Sean Mcavinue shows you how to do this with some PowerShell Automation!
Whether you like it or not, MFA is coming for you! You can either deploy and support MFA for your users, or Microsoft is going to do it for you. The choice is yours. Learn more about how Microsoft will be enforcing MFA in the future, and what you should do.
At the end of March, Practical 365 traveled with the TEC European roadshow, traveling between three cities in Europe over a week, listening to experts talking primarily about security-focused topics aimed at improving your Microsoft 365, Azure AD and Active Directory. Read our whistle-stop tour of the most important points made by expert speakers.
PowerShell is an important tool for any Microsoft 365 Admin – particularly in larger environments. In this article, Sean McAvinue outlines some key tools and concepts to help tenant admins build a ‘toolbox’ for PowerShell to make almost any scripting task easier and more robust.
In the third and final article in a series covering Git-based Source Control for Microsoft 365 Tenant Admins, Andy Schnieder covers how to leverage tools to streamline your workflow with Git and gain insight into some useful advanced techniques.
The best hybrid Active Directory and Microsoft 365 security experts are going on the road to bring our European friends a taste of The Experts Conference (TEC). Join us in London (17 April), Paris (19 April), and Frankfurt (21 April) for unmatched advice from experts such as Tony Redmond, Steve Goodman, and more!
My team has recently worked on some projects featuring multi-tenant and multi-Exchange environments. A common requirement for all projects is the ability to share free/busy information across all environments. In this article, I will dive into using free/busy sharing with Exchange/Microsoft 365 in the worldwide cloud. Sharing Free/Busy Information Let’s start with the obvious issues: […]
In early December 2022, Rackspace had a major breach in their exchange environment that led to customers' mail data being stolen. This article explains what happened and what can be learned from this incident.
Join us as we continue the Exchange Online Domain Transfers series, focusing on the strategy phase of a Microsoft 365 domain move project.
It Is known that Microsoft encrypts data both at rest and in transit, but is this enough protection for your documents? In this article, Paul Robichaux goes over adding an extra layer of protection through Double-Key and Customer Key Encryption.
Security researchers love to report software vulnerabilities that they find. That's their role and it's a valuable contribution to the technical community. However, some of the reports about Microsoft 365 flaws are over-hyped and under-considered, like a recent example covering the risk of phishing in the Exchange Online Direct Send feature.