Guide: Getting Started with Zero Trust Security in Microsoft 365
I have started a series on Zero Trust Security model in Microsoft 365. This is being published on Petri. You can read it here. Zero Trust is a security model…
I have started a series on Zero Trust Security model in Microsoft 365. This is being published on Petri. You can read it here. Zero Trust is a security model…
Reply All storms have been a nuisance that was left unchecked for a long time. Microsoft has finally decided to crack down on this rather reprehensible aspect of Exchange. In…
The Microsoft 365 Threat protection status report is an amalgamation of several Exchange Online security reports that contain information about malicious messages detected by Exchange Online Protection (EOP) and Office…
Microsoft rolled out a new feature that allows you to set out of office messages in Microsoft Teams. In this article, I explain how you can create out of office…
The ability to send emails using a proxy address was a feature that was highly anticipated for Microsoft 365 (formerly Office 365). Microsoft originally planned to release this feature later…
In my last post, I outlined how you can identify malicious items in Microsoft 36 Threat Explorer. In today's post, we'll take a look at the possible actions you can…
In this first post of two, you will be introduced to Microsoft 365 Threat Explorer. In my first post, I will explain how you can find malicious emails. In a…
In this post, I will show you how to trace emails in Microsoft 365 with PowerShell if users complain that they didn't receive certain emails.This is the location of the…
If emails are missing in Microsoft 365 (formerly Office 365), that is, if users complain that they didn't receive emails, you need to know how to trace these messages. In…
I wrote this post on ATA. PowerShell can do a lot of things and, like any good programming language, it can do just about anything you want with dates. Using…