Entries by

How to detect a breach in Microsoft 365

How to detect a breach in Microsoft 365 When an attacker gains access to your environment, there’s no incentive for them to reveal their presence. Microsoft 365 data breaches will often go unnoticed for months, with attackers collecting information and waiting for opportunities to make money. The advice from Microsoft, and many others, is to […]

Should I use Dropbox Business or SharePoint and OneDrive?

Now more than ever, being able to work remotely is of critical importance. Ensuring that employees have the right tools to work from home or in isolation, is a real concern for business owners. Why do we recommend Dropbox Business instead of OneDrive and SharePoint? This is a question we’re asked occasionally and it’s something […]

,

How to connect to delegated Office 365 tenants using the secure app model

Connect to delegated Office 365 tenants via PowerShell using the Secure App Model To increase security, Microsoft is requiring that Microsoft Partners have Multi-Factor authentication enabled on all partner accounts. To ensure that delegated admin scripts continue to work correctly, Microsoft Partners will need to authenticate using the secure app model. This guide will cover […]

, ,

Sync Office 365 User Activity and Usage with IT Glue

Sync Office 365 User Activity and Usage with IT Glue The Microsoft Graph API provides a bunch of useful user activity and usage reports that provide insight into how users are taking advantage of Office 365 services. This guide will demonstrate how to collect and sync that information with a dynamic flexible asset in IT […]

, ,

Sync Azure Active Directory Risk Events with a SharePoint list for all customer tenants

Sync Azure Active Directory Risk Events with a SharePoint list for all customer tenants According to Microsoft, the vast majority of security breaches occur when attackers gain access to data using a compromised identity. To help combat this, Azure Active Directory uses machine learning and advanced heuristics to identify suspicious activities and generate risk events. […]

,

Check provisioning status of Shared Computer Activation for Microsoft 365 Business customers

Check provisioning status of Shared Computer Activation for Microsoft 365 Business customers Microsoft recently announced that Shared Computer Activation will be available for customers using Microsoft 365 Business. Shared Computer Activation is a licensing feature that allows users to activate Microsoft Office on a shared environment like an RDS deployment This is great news for […]

,

Delete specific emails from Office 365 inboxes in customer tenants via PowerShell

Delete specific emails from Office 365 inboxes in customer tenants via PowerShell There are plenty of scenarios where it can be handy to retrieve and delete specific emails from user mailboxes. And while Microsoft provides an excellent method to do this, it doesn’t address every scenario. This script is designed for Microsoft Partners or Office […]

,

Manage Office 365 customers’ security alerts with SharePoint, Microsoft Flow and Azure Functions

Manage Office 365 customers’ security alerts with SharePoint, Microsoft Flow and Azure Functions The Microsoft Graph Security API is an extremely useful addition to the Microsoft Graph for Office 365 admins, however it can be especially useful for Microsoft Partners and Managed Service Providers. Not only can it be used to retrieve customers’ secure scores, […]

,

Sync Mailbox Usage Reports with a SharePoint list

Sync Mailbox Usage Reports with a SharePoint list The Microsoft Graph includes all sorts of useful reports on how users are taking advantage of the various Office 365 services. One particularly useful report, especially for IT Admins and MSPs, is the mailbox usage report. This built in report provides a summary of each users mailbox […]

, ,

Running Delegated Admin PowerShell Scripts with MFA enabled accounts

Running Delegated Admin PowerShell Scripts with MFA enabled accounts Microsoft have introduced some important security requirements for users who access customer tenants via delegated administration. Admins and users with access to customer tenants must use multi-factor authentication when accessing customers’ Office 365 environments. While this is great for security, it will likely break any scripts […]