fbpx
GCITS
  • What we do
    • Secure Managed Services
    • GCITS Security Pack
    • Microsoft 365
    • Dropbox Business
    • Microsoft Cloud Security Audit
  • Industries
    • Accounting
    • Engineering and Construction
    • Finance and Professional Services
    • Hospitality and Tourism
    • Legal
    • Manufacturing
    • Medical and Allied Healthcare
    • Not-for-profit
    • Real Estate
  • Resources
    • Case Studies
    • Testimonials
  • Blog
  • Knowledge Base
  • About us
    • Our Team
    • Contact us
  • 1300 369 111
  • Search
  • Menu Menu
You are here: Home1 / GCITS Security Guides

Warn users when an external email arrives with the same display name as someone in your organisation

Warn users when an email arrives from a sender with the same display name as someone in your organisation With...
  • 80
  • 135420

Find all Inbox Rules that forward mail externally from Office 365 with PowerShell

Find all Inbox Rules that forward mail externally from Office 365 using PowerShell It’s a good idea to be aware...
  • 58
  • 97551

Export a list of locations that Office 365 users are logging in from

Export a list of locations that Office 365 users are logging in from Many companies will have an idea of...
  • 37
  • 53129

Enabling the Unified Audit Log on all delegated Office 365 tenants via PowerShell

Enabling the Unified Audit Log on all delegated Office 365 tenants via PowerShell What is the Office 365 Unified Audit...
  • 13
  • 39591

How to protect your data with Information Rights Management in Office 365

How to protect your data with Information Rights Management in Office 365 In the past few months we’ve put together a few Data...
  • 16
  • 38309

Block Inbox Rules from forwarding mail externally in Office 365 using PowerShell

Block Inbox Rules from forwarding mail externally in Office 365 using PowerShell Auto-forwarding inbox rules can be used by hackers...
  • 8
  • 23289

Enable mailbox auditing on all users for all Office 365 customer tenants

Enable mailbox auditing on all users for all Office 365 customer tenants To increase your Office 365 security score, it’s...
  • 12
  • 21534

Find external forwarding mailboxes in Office 365 with PowerShell

Find external forwarding mailboxes in Office 365 with PowerShell This is the single Office 365 tenant version of this script....
  • 14
  • 15860

Apply Office 365 Retention Policies to all customers via PowerShell and Delegated Administration

Apply Office 365 Retention Policies to all customers via PowerShell and Delegated Administration eDiscovery and Litigation Holds are being phased...
  • 2
  • 14177

How to connect to delegated Office 365 tenants using the secure app model

Connect to delegated Office 365 tenants via PowerShell using the Secure App Model To increase security, Microsoft is requiring that...
  • 10
  • 14052

Find external forwarding mailboxes in all Office 365 customer tenants with PowerShell

Find external forwarding mailboxes in all Office 365 customer tenants with PowerShell   Hackers and rogue employees can set Office...
  • 6
  • 10209

Monitor External Mailbox Forwards in all Office 365 Customer tenants

Monitor External Mailbox Forwards in all Office 365 Customer tenants It’s common for hackers and bad actors to set up...
  • 5
  • 9410

Manage Office 365 customers’ security alerts with SharePoint, Microsoft Flow and Azure Functions

Manage Office 365 customers’ security alerts with SharePoint, Microsoft Flow and Azure Functions The Microsoft Graph Security API is an...
  • 6
  • 8791

Add your domain name to trusted senders for all delegated Office 365 users

Add your domain name to trusted senders for all delegated Office 365 users This post is part of our series...
  • 1
  • 6886

Sync Azure Active Directory Risk Events with a SharePoint list for all customer tenants

Sync Azure Active Directory Risk Events with a SharePoint list for all customer tenants According to Microsoft, the vast majority...
  • 3
  • 6814

Check IT Glue passwords against Have I Been Pwned breaches

Check IT Glue passwords against Have I Been Pwned breaches Hackers will often use password spray attacks to gain access...
  • 9
  • 5528

How to detect a breach in Microsoft 365

How to detect a breach in Microsoft 365 When an attacker gains access to your environment, there’s no incentive for...
  • 4
  • 3117

Contact us

Ph. 1300 369 111

Make an enquiry

Recent Posts

  • How do I protect company data when my team works from home?
  • Managing identity risks with Azure Active Directory Identity Protection
  • Real estate company combats data security threats and increases efficiency with Microsoft 365
  • Financial services group banks on Microsoft 365 to better safeguard data
  • How do I stop phishing emails?

Recent Knowledge Base Articles

  • Create Dynamic Distribution List based on email domain
  • How to detect a breach in Microsoft 365
  • How to connect to delegated Office 365 tenants using the secure app model
  • Sync Office 365 User Activity and Usage with IT Glue
  • Sync Azure Active Directory Risk Events with a SharePoint list for all customer tenants

Recent tweets

Tweets by GCITSTechnology
Copyright Gold Coast IT Support
  • Youtube
  • Facebook
  • Twitter
  • Instagram
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visit to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Other cookies

The following cookies are also needed - You can choose if you want to allow them:

Accept settingsHide notification only