Exchange Online Protection (EOP) Best Practices and Recommendations
Configuration
Featured

Exchange Online Protection (EOP) Best Practices and Recommendations

Yes. I said it.

Someone needed to put a line in the sand and today, that person is me.  I’m going to say these are some best practices.

But of course, your mileage may vary, depending on your type of organization (users at a local bank or city government will have different threats presented to them than an engineering firm with international customers, for example). … [ Continue reading ]

Tern around: Concise PowerShell Ternary Operators
Information

Tern around: Concise PowerShell Ternary Operators

I’m writing this down because…

Mark me! A fun drinking game for all! 🍻 : Outlander

I will forget it.

I was reviewing someone else’s code that was largely full of common if/then statements and then stumbled across a solitary instance of a ternary statement.

It took me a while to decipher since the ternary evaluation happened as an argument for a cmdlet–definitely limiting its readability. … [ Continue reading ]

Update to Find-DuplicateValues script
Identity

Update to Find-DuplicateValues script

Hey! As we enter the waning days of summer, I wanted to update a tool that I’ve had sitting around for a while.

Years ago, when I was in Microsoft Consulting Services, I ran into one particular customer that had manually populated the mail property of thousands of service accounts, groups, vendor accounts, and contacts–not with the object or user’s individual email address, but with the email address of the person who managed the AD object. … [ Continue reading ]

Configuration

Manual OAuth Configuration for Microsoft Teams in a Hybrid Scenario

There are times when your organization (or a customer’s organization) just can’t run the Exchange Hybrid Configuration Wizard.  If you’re embarking on one of our strategies to take advantage of Microsoft Teams while your mailboxes are still on-premises, the Exchange Hybrid configuration is the go-to way to get there, since it sets all this stuff up automatically. … [ Continue reading ]

Requiring multifactor authentication for all Teams users not on trusted networks
Configuration

Requiring multifactor authentication for all Teams users not on trusted networks

 

This week, I’m exploring some of the basics of Conditional Access and using it with Microsoft Teams.

In the “legacy” world (the term we attach to most things that aren’t bleeding edge these days), we typically saw organizations build the high, high walls and dig the deep, deep moats (and occasionally fill them with alligators) to keep the bad guys out.… [ Continue reading ]