Configuring cross-cloud identity synchronization with Azure AD Connect / Entra ID Connect

Over the last few weeks, I’ve been noodling on a good way to get B2B synchronization to work (similar to cross-tenant synchronization) involving Microsoft 365 Government Community Cloud High (GCCH) and Microsoft 365 Worldwide/Commercial.

While there is a preview available for cross-cloud synchronization, it’s a ways off from being generally available.… [ Continue reading ]

Working around accounts that expire with AAD Connect: REDUX

When attempting to migrate a Microsoft 365 organization from federated authentication to Password Hash Sync, there are a couple of gotchas that can impact how you manage certain accounts.  These changes in authentication behavior determine whether you need to implement new workflows or business processes–changes surrounding expired accounts and accounts flagged to force password change on next logon.… [ Continue reading ]

Using AuthoritativeNull to overwrite an msExchMailboxGuid

While working on a unique tenant-to-tenant migration, we were going to be synchronizing a significant number of identities that had already been hybrid moved to a tenant from an on-premises Exchange organization.

Since they had existing values in msExchMailboxGuid, there was a likelihood that they might not be synchronized as just user identities–even though they were set with the msExchRecipientDisplayType of 6 (RemoteMailUser) and msExchRecipientTypeDetails of 128 (MailUser). … [ Continue reading ]

Locating accounts in Active Directory that are expired but still active

While working with a customer over the past few weeks implementing a new AAD Connect synchronization rule to disable expired accounts, we wanted to evaluate how many accounts might be selected by such a rule.

Checking hundreds, thousands, or even tens of thousands of accounts by hand doesn’t rank high on anyone’s list–fortunately, that’s what PowerShell was made for.… [ Continue reading ]

Working around accounts that expire with AAD Connect

When attempting to migrate a Microsoft 365 organization from federated authentication to Password Hash Sync, there are a couple of gotchas that can impact how you manage certain accounts.  These changes in authentication behavior determine whether you need to implement new workflows or business processes–changes surrounding expired accounts and accounts flagged to force password change on next logon.… [ Continue reading ]

Update to AADConnect Network Communications Test

It’s been a few months since I’ve updated this tool, but feedback from two individuals led me to a couple of small updates:

  • Updated the method by which domain controllers are selected for testing.  Previously, I just used the $env:LOGONSERVER variable to find the authenticating DC and didn’t actually use any of the other DCs in site (any of which AAD Connect can bind to). 
[ Continue reading ]

Update to Find-DuplicateValues script

Hey! As we enter the waning days of summer, I wanted to update a tool that I’ve had sitting around for a while.

Years ago, when I was in Microsoft Consulting Services, I ran into one particular customer that had manually populated the mail property of thousands of service accounts, groups, vendor accounts, and contacts–not with the object or user’s individual email address, but with the email address of the person who managed the AD object. … [ Continue reading ]

Manual OAuth Configuration for Microsoft Teams in a Hybrid Scenario

There are times when your organization (or a customer’s organization) just can’t run the Exchange Hybrid Configuration Wizard.  If you’re embarking on one of our strategies to take advantage of Microsoft Teams while your mailboxes are still on-premises, the Exchange Hybrid configuration is the go-to way to get there, since it sets all this stuff up automatically. … [ Continue reading ]

Requiring multifactor authentication for all Teams users not on trusted networks

This week, I’m exploring some of the basics of Conditional Access and using it with Microsoft Teams.

In the “legacy” world (the term we attach to most things that aren’t bleeding edge these days), we typically saw organizations build the high, high walls and dig the deep, deep moats (and occasionally fill them with alligators) to keep the bad guys out.… [ Continue reading ]