Store your Microsoft 365 passkeys in 1Password
Check out this article via web browser: Store your Microsoft 365 passkeys in 1Password Syncable passkeys in Microsoft 365 and Entra ID are here, so...
Read Article →Check out this article via web browser: Store your Microsoft 365 passkeys in 1Password Syncable passkeys in Microsoft 365 and Entra ID are here, so...
Read Article →Teams now includes weaponized file protection and malicious URL protection to make sure that people don't share bad files or URLs in chats or chann...
Read Article →Explore the new Microsoft 365 Baseline Security Mode. Learn how to enforce secure baselines, run impact simulations, and see how controls compare t...
Read Article →Autopilot Device Association finally gives Windows the tenant context it was missing during OOBE. With that link in place, Windows can apply OOBE s...
Read Article →Multi Admin Approval (MAA) in Microsoft Intune is a security feature that requires a second user’s approval before critical changes can be executed...
Read Article →The December 2025 update (version 18) of the Automating Microsoft 365 with PowerShell eBook is now available to download. Current subscribers can f...
Read Article →Expand the logging capability of the DFE agent using custom rules - A bit of background on this feature might be needed - and a lot of credit has t...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Learn how to use Microsoft Graph PowerShell to create an Agent Identity in Microsoft Entra Agent ID from an Agent Blueprint. The post How to Create...
Read Article →Check out this article via web browser: KB- Windows 11 Advanced passkey settings To whom it may concern. Since Windows 11 is capable of storing pas...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →A new DLP policy for Copilot prompts monitors blocked sensitive information types like credit card numbers to stop their use in Copilot prompts. Th...
Read Article →To ensure Microsoft Defender Antivirus (Defender AV) provides full protection and leverages all its capabilities, it must be configured with the co...
Read Article →Learn how to create Agent Identity Blueprints and Blueprint Principals in Entra Agent ID using Microsoft Graph PowerShell. The post How to Create a...
Read Article →Global Secure Access (GSA) enforces that all client traffic is routed through the cloud before reaching the target resource via Private Network Con...
Read Article →The Ignite 2025 keynote was a marathon 150-minute event, but some interesting Microsoft 365 announcements emerged, mostly centered on AI. Microsoft...
Read Article →Introduction At Ignite 2025, Microsoft announced Entra ID would be supporting Synced Passkeys for multiple credential providers. This means users c...
Read Article →Microsoft launched the preview of the Exchange Admin API on November 17. The new API is intended to close known feature gaps that exist in the Grap...
Read Article →Learn about the new Agent ID (preview) functionality in Microsoft Entra as well as Agent Identities and Agent Blueprints. The post What is Microsof...
Read Article →Wouldn’t it be nice if we finally had real controls for Quick Machine Recovery?Something that lets you trigger remediation when the device is alrea...
Read Article →PowerShell script support has been added directly to the Intune app deployment Wizard. Learn why this is a great improvement. The post PowerShell S...
Read Article →The Entra ID Governance solution includes a workflow to detect and remove inactive user accounts. Sounds good, but the same can be done with PowerS...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →A temporary chat with Microsoft 365 Copilot is one that forgets everything discussed in the conversation once the chat is over. The idea is that by...
Read Article →Learn how to detect when a Global Admin silently elevates their access across all Azure subscriptions using Entra ID, Log Analytics, Azure Monitor,...
Read Article →Last Updated on November 14, 2025 by Michael Morten Sonne Introduction Many organizations are tightening there security for… The post The Hid...
Read Article →Microsoft is redefining Windows 11 compliance with Microsoft Azure Attestation (MAA). They are doing so with some new evaluation settings, such as ...
Read Article →In January 2025, Microsoft changed the SharePoint folder location to store copies of the email sent to Teams channels. Apparently, this update impr...
Read Article →This blog dives into how Intune handles MSI app deployments when you choose App Install Context: User, and why that setting doesn’t always do what ...
Read Article →The question was asked if it was possible to identify use of the Claude LLM by the Copilot Researcher Agent. Audit records often help, so that's th...
Read Article →Learn how to opt into the public preview and setup synced Passkeys in Microsoft Entra allowing users to store Passkeys in their iCloud. The post Ho...
Read Article →Learn about the new Account Recovery preview feature in Microsoft Entra that allows users to verify their identity during account recovery. The pos...
Read Article →Entra ID has long supported soft-deleted Microsoft 365 Groups. Now support is available to list and restore soft-deleted security groups in both th...
Read Article →Learn how to stay up to date with constant changes to Microsoft 365 products and services and build a consistent routine. The post How to Stay up t...
Read Article →Discover how to use PIM with RBAC roles to provide just-in-time access for users. Learn setup for Purview, Exchange, and more, plus the pros, cons,...
Read Article →A new Teams feature allows users to initiate chats with any email address. This caused some commotion in the security community, but it's not that ...
Read Article →This article explains how to use PowerShell to extract audit data to analyze the use of emojis as Teams reactions to chat and channel messages. Thi...
Read Article →Learn how to restore deleted cloud security groups in Microsoft Entra using the web portal and Microsoft Graph PowerShell. The post Restore Deleted...
Read Article →The Microsoft 365 User Passwords and Authentication report now includes the last used date for authentication methods (when available). The new dat...
Read Article →In many Microsoft Entra ID environments, the quality of user attributes remains an often underestimated factor in security and governance. WatchTra...
Read Article →Microsoft 365 Companion Apps are being deployed to Windows 11 PCs now. The apps don't seem to add much if any value over standard Microsoft 365 app...
Read Article →A recent report says that new Microsoft leadership wants to reimagine Outlook with lots of many AI features to make the client much more of an effe...
Read Article →This blog explains how Azure Bastion enables secure access to virtual machines without exposing public endpoints, leveraging hub-spoke architecture...
Read Article →With just 2 remaining months in 2025, it is a good idea to check the Microsoft Defender environment and check of new features are correctly configu...
Read Article →I was recently asked if I knew a way to export Microsoft Purview RBAC roles with members. I couldn’t find a ready solution, so I wrote a PowerShell...
Read Article →We’ve covered what Authentication Contexts are, why they matter, and how they help us strengthen access and data security in Microsoft 365. Now it’...
Read Article →The Office 365 for IT Pros Team is happy to announce the availability of the November 2025 update. Subscribers can download the PDF and EPUB files ...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Some inconsistencies in the MDO P2 service description and licensing terms exposed a need for tenants to license every user and shared mailboxes. M...
Read Article →Learn how to find all inactive authentication methods registered to users in Microsoft Entra using Microsoft Graph PowerShell. The post How to Find...
Read Article →The site attestation policy is designed to require site owners to make a positive statement that the settings of their site, including its current ...
Read Article →In-depth exploration of why certain apps do not appear in the Conditional Access app picker in Microsoft Entra ID, the impact of public vs. confide...
Read Article →The rapid and widespread rollout of Microsoft 365 Copilot has created a governance challenge for organizations. Features are often enabled before c...
Read Article →Microsoft announced the modernization of grouping for sensitivity labels to a new "dynamic architecture." It doesn't take much to be more dynamic t...
Read Article →As is the way of the internet, the news that a feature to automatically set the Teams work location for users created a huge fuss about the prospec...
Read Article →Introduction Within Microsoft 365, users can extend app functionality directly from built‑in app stores. Outlook add‑ins, Teams apps, and Office ex...
Read Article →Check out this article via web browser: KB – Enable Single Sign On for Windows 365 Cloud PC This short tutorial explains how to enable Single...
Read Article →Learn how to connect to Microsoft Teams across tenants using a multi-tenant enterprise application and managed identities in Azure. The post How to...
Read Article →Teams stores information in a local state file, including encrypted access tokens. A report from a French company explained how to extract and use ...
Read Article →Check out this article via web browser: Dynamic Conditional Access policies using custom security attributes Conditional Access policies can become...
Read Article →Seamless Single Sign-On (Seamless SSO) is an optional feature in Microsoft Entra Connect that enables domain-joined Windows devices on the internal...
Read Article →Learn to filter Microsoft Entra Enterprise Applications with Graph PowerShell. Find apps based on creation method, like first-party, third-party, o...
Read Article →Enterprise apps can come from a variety of sources. Most are Microsoft 1st party apps, and the rest are ISV apps. It's easy to add an app without r...
Read Article →Introduction Modern collaboration tools such as OneDrive and SharePoint depend on efficient browser communication to deliver both online and offlin...
Read Article →This blog reveals how a silent HP OneAgent update (version 1.2.50.9581) deleted the MS-Organization-Access certificate, causing devices to disconne...
Read Article →The Entra ID password protection policy contains settings that affect how tenants deal with passwords. Entra ID includes a default policy that does...
Read Article →Entra ID is about to introduce passkey profiles, a more granular approach to passkey settings. The change is good, but you might like to check the ...
Read Article →For years, Intune has managed Windows devices through OMA-DM (Open Mobile Alliance Device Management). It worked, but as explained in our previous ...
Read Article →Intro Microsoft recently announced that device isolation exclusions in Defender for Endpoint are now generally available. This made me think about ...
Read Article →The November 2025 update for the Automating Microsoft 365 with PowerShell eBook is available online. Subscribers can download the new PDF and EPUB ...
Read Article →Learn how a non-privileged owner can 'steal' an Access Token from the Entra admin centre to programmatically hide a Service Principal using the Mic...
Read Article →Explore how physical security cards combine passwordless login and building access, offering secure, simple authentication for modern workplaces.
Read Article →Check out this article via web browser: A public bug report for Entra ID application policies I’ve spent the last couple of nights trying out...
Read Article →Introduction Password managers have become a default convenience in modern browsers, including Microsoft Edge. Microsoft now recommends enabling th...
Read Article →With identities and access strengthened in part 2 , it’s time to turn our focus to real-world data protection with Authentication Contexts. One of ...
Read Article →A new audio-only recording option for Teams meeting suppresses the video feed from meeting participants when generating the MP4 file for the meetin...
Read Article →In this blog, we go back in time and look at how Windows device management really started.How Microsoft built the first framework for managing devi...
Read Article →Check out this article via web browser: A closer look at Entra Application policies to govern secrets and certificates My latest post on this topic...
Read Article →Over the past years, I’ve been maintaining a Conditional Access baseline that organizations can use as a starting point when implementing or review...
Read Article →Last Updated on October 20, 2025 by Michael Morten Sonne Introduction Over the last few days, I spent… The post Extending the Migrate2GSA Pow...
Read Article →Agenda auto-draft is a new feature for OWA and the new Outlook to help meeting organizers create a draft meeting agenda using AI. The Copilot-gener...
Read Article →If you can't use managed identities, credential resources are a way to manage username and password credentials for Azure Automation runbooks. The ...
Read Article →A recent change has exposed the applications used by the My Sign-ins portal for use in conditional access policies. This article discusses the app-...
Read Article →One of the settings for sensitivity labels governs how long items protected by a label remain accessible (including offline access) before reauthen...
Read Article →Moving Conditional Access policies from report-only to enforced mode can secure your environment - or lock everyone out. This post walks through sa...
Read Article →Recently I posted a blog about Entra ID Application Registration secret management, in which I explained how to rotate Application Registration sec...
Read Article →This blog covers one of the most requested features ever: finally being able to automatically translate Entra group SIDs into readable names on the...
Read Article →OpenAI has launched a ChatGPT enterprise SharePoint Connector that allows organizations to synchronize files from SharePoint Online to ChatGPT. I c...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Introduction Configuring Conditional Access (CA) for guest users can be challenging when you want to strictly limit access to Office 365 and a few ...
Read Article →A confirmed and fixed Microsoft Entra PIM flaw reported to MSRC - learn what happened, how it was fixed, and what admins should check.
Read Article →Introduction When connecting Microsoft Sentinel to Defender XDR, there are a couple of changes happening in tables which you should be aware of. Ev...
Read Article →Check out this article via web browser: KB – Failed to verify domain name – Entra ID This is a knowledge base item. Hope it will help y...
Read Article →Check out this article via web browser: Trigger Logic App on group membership changes in Entra ID A couple of years ago, I stumbled upon a neat Log...
Read Article →The Copilot usage report Graph API is now generally available. Like the report APIs for the other workloads, the Copilot usage API helps to underst...
Read Article →A look at detection engineering from inception to completion - The concept of this blogpost is quite simple - we will start with an imaginary compa...
Read Article →On Oct 14, 2025, Exchange 2019 and 2016 reach end-of-life and Exchange SE becomes the only supported on-premises Exchange server. In other news, we...
Read Article →Teams users can use emojis to create or rename chat section names. By incorporating emojis into section names, users create "visual anchors" to hel...
Read Article →An update for Chromium 141 can affect the ability of SharePoint Online and OneDrive for Business to access offline content, including files and lis...
Read Article →Learn how to use custom security attributes in Entra ID to target apps that don’t appear in Conditional Access. This step-by-step guide covers attr...
Read Article →This blog will address one of the biggest misunderstandings I hear regarding Intune: the misconception that Windows devices ONLY receive new polici...
Read Article →Application Registrations are an amazing feature within Entra ID, allowing you to deploy a non-personal identity for a wide array of different use-...
Read Article →Check out this article via web browser: How to restore deleted Entra ID Conditional Access policies and Named Locations Entra ID Conditional Access...
Read Article →What's the best way to find SharePoint sites with the Microsoft Graph PowerShell SDK? Is the Get-MgAllSite cmdlet best or should you use the Get-Mg...
Read Article →Last Updated on October 4, 2025 by Michael Morten Sonne Introduction Microsoft continues to improve Entra’s resilience features… The post Ent...
Read Article →Devices today are diverse, mobile and therefore exposed to a wide range of threats. Traditional antivirus solutions detect known patterns but leave...
Read Article →New Graph APIs allow Entra administrators to restore a conditional access policy with a Graph request. This article explains how to list, restore, ...
Read Article →Hidden Device Preparation template enables OOBE controls in AP DP. Naming at OOBE, skip EULA, skip keyboard, hide privacy. Works through device ass...
Read Article →Learn how to convert the Source of Authority for a hybrid user from Active Directory to Microsoft Entra using PowerShell. The post How to Convert a...
Read Article →Attackers might attempt to use social engineering to trick Teams users in compromise. Trusted indicators help users understand the status of extern...
Read Article →What is changing As a valued member of our community, we would like to inform you that we are migrating our HybridBrothers.com blogging website to ...
Read Article →Monthly update #124 for the Office 365 for IT Pros (2026 edition) eBook is now available. Current subscribers can download the updated PDF and EPUB...
Read Article →The Outlook events from email feature changes from January 31, 2026. Events will only be created if notifications support the properties for events...
Read Article →This blog is about the 60-minute delay that occurs before the required Win32 apps are installed after Autopilot. ESP blocking apps complete without...
Read Article →Learn how to restore deleted Conditional Access policies in Microsoft Entra using Microsoft Graph PowerShell. The post How to Restore Deleted Condi...
Read Article →In Part 1 of this mini-series, we explored the what, why, and how of Microsoft Entra Authentication Contexts, laying the foundation for what they a...
Read Article →Do you also struggle, like I do, to assign the correct permissions in Microsoft Defender XDR RBAC when designing your RBAC model? I recently create...
Read Article →Microsoft 365 Copilot Search can be extended by ingesting information from external sources through a Microsoft 365 Copilot Connector. In this arti...
Read Article →Learn how to configure Microsoft Entra Life Cycle workflows to alert on and clean-up inactive users in Microsoft Entra. The post How to Configure L...
Read Article →On September 24, Microsoft announced that Anthrophic LLMs could be used with the Copilot Researcher agent and to build agents with Copilot Studio. ...
Read Article →With not a little hype, Microsoft launched the SharePoint Knowledge Agent on September 18. Getting some AI help to organize sites sounds good, but ...
Read Article →An assembly clash happens when a PowerShell module attempts to load a .NET assembly only to find that a different version is already loaded in the ...
Read Article →Learn how to configure password protection settings like banned password lists in Microsoft Entra using Microsoft Graph PowerShell. The post How to...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →A change to a Graph beta API meant that some data used to create the user password and authentication report was no longer available. A script upda...
Read Article →The Office 365 for IT Pros team is happy to announce the availability of the October 2025 update for the Automating Microsoft 365 with PowerShell e...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Check out this article via web browser: No, your NHIs can’t use passwords either! For human identities, going passwordless is becoming pretty...
Read Article →Azure Back to School s a fantastic community initiative founded by Dwayne Natwick and Derek Smith. As in previous years,Continue Reading
Read Article →The rollout of the Copilot Chat integration with the Microsoft 365 apps has started, with the intention of making it easier to use AI in peoples’ w...
Read Article →With Exchange 2019 support ending, should you upgrade to the Subscription Edition or remove your last server? This guide covers the costs, hybrid c...
Read Article →Guest account management should be a part of every Microsoft 365 tenant administrator’s checklist, unless the tenant has no guests. That’s possible...
Read Article →The Entra ID Keep Me Signed In (KMSI) feature creates persistent authentication cookies to allow users to avoid sign-ins during browser sessions. I...
Read Article →Discover best practices for using Application Policies to block client secrets, restrict credential lifetimes, and enforce secure identifier URIs d...
Read Article →Microsoft 365 Copilot now has some SharePoint skills to deploy in the SharePoint admin center. The problem is that the skills aren't very good and ...
Read Article →Last Updated on September 17, 2025 by Michael Morten Sonne Introduction Microsoft has recently teaset App Management Policies… The post Entra...
Read Article →This blog explores the behavior change in Intune’s built-in compliance policy, specifically why devices are still marked as compliant even when the...
Read Article →Microsoft plans to deploy an update to change how transcription behaves for Teams meetings where Copilot is enabled. New meetings will not generate...
Read Article →Learn why understanding core principals of Microsoft 365 is important and how to properly assess the posture of your Microsoft 365 tenant. The post...
Read Article →This article describes the prerequisites and how to run cmdlets from the Teams PowerShell module in Azure Automation runbooks. We also consider whe...
Read Article →A new SharePoint Site content and policy comparison report is available to tenants with Microsoft 365 Copilot or SharePoint advanced management lic...
Read Article →Last Updated on September 11, 2025 by Michael Morten Sonne Introduction I’m excited to announce that SignToolGUI version… The post SignTool G...
Read Article →Microsoft 365 users see the profile card and might wonder where the information displayed on the card comes from. Entra ID is the obvious source, b...
Read Article →Conditional Access Essentials aren’t just about writing policies – it’s about managing real-world scenarios. In this guide, I show how to handle tr...
Read Article →Passkey registration problems Passkeys in Microsoft Authenticator are fantastic, assuming you can get users logged in to the app successfully. Unfo...
Read Article →A new policy setting is available to force Microsoft 365 enterprise (Office subscription) applications to save to cloud locations and ignore the lo...
Read Article →Last Updated on September 10, 2025 by Michael Morten Sonne Introduction As a Microsoft Most Valuable Professional (MVP),… The post What’s nex...
Read Article →Check out this article via web browser: You shall not pass(key)! (updated) For both modes, users who have previously registered a method that can b...
Read Article →Microsoft announced a new Copilot license check diagnostic for the Exchange Connectivity Analyzer. Sounds good, but the test is very simple, and it...
Read Article →How to automatically sort Microsoft Entra Menu items alphabetically using the EntraSort Chrome browser extension. The post Use EntraSort to Sort th...
Read Article →MC1134747 describes a new permissions requirement for Entra apps that run Teams PowerShell cmdlets. Fixing apps to meet the new requirement is easi...
Read Article →The Org Settings section of the Microsoft 365 admin center has a new People Settings section where you can choose properties for the Microsoft 365 ...
Read Article →Installing Windows Quality Updates during the out-of-the-box (OOBE) experience is now generally available is been pulled back! (Check out this para...
Read Article →It was a rough week for Intune. First, BitLocker policies suddenly stopped applying without any good reason. The event logs indicated that the BitL...
Read Article →Copilot memory is a term that refers to different things, including Copilot communication memory, a method to use the Graph to personalize response...
Read Article →This blog will discuss a case where BitLocker policies pushed during Windows Autopilot appeared to be applied in the event logs, but they never act...
Read Article →Last Updated on September 2, 2025 by Michael Morten Sonne Introduction The Microsoft Graph community is rallying for… The post Closing Micros...
Read Article →This instalment of Conditional Access Essentials explores authentication contexts, PIM, and securing sensitive resources. Learn how to enforce step...
Read Article →Microsoft has depreciated the Microsoft Graph CLI and Graph Toolkit. It’s nice to see some rationalization, but the real need is for better quality...
Read Article →Registration of security information such as the Microsoft Authenticator app, FIDO2 security keys or OATH tokens is a critical component of modern ...
Read Article →Adversary-in-the-middle phishing attacks are still more common in use, in the last year and the start of 2025 there is still a more visible increas...
Read Article →Monthly update #123 is available for the Office 365 for IT Pros eBook. Subscribers can download updated EPUB and PDF files for the main book and th...
Read Article →Effortlessly track and document all changes to public Microsoft Entra documentation and stay ahead of this rapidly changing product. The post What ...
Read Article →A custom runtime environment is a way of defining a specific job execution environment for Azure Automation runbooks, including Microsoft Graph Pow...
Read Article →Check out this article via web browser: Security Info Registration. Entra ID’s rabbit hole. This blog post needs a brief introduction. Bear w...
Read Article →In March, Microsoft said that they'd change Teams to offer suggestions about which inactive channels a user might want to hide from client channel ...
Read Article →Intro There are many helpful blog/videos posts about managing Microsoft Defender for Endpoint (MDE) updates on Windows, but there’s not much inform...
Read Article →Learn how to enable and use the new delegate approvals feature in Microsoft Entra to delegate access package request approvals. The post How to Del...
Read Article →Table of Contents Introduction Requirements Features How does it work? File & Folder Comparison Cross-Tenant Comparison Advanced Options Output...
Read Article →The Office 365 for IT Pros eBook team is proud to announce the availability of update 15 for the Automating Microsoft 365 with PowerShell eBook. Th...
Read Article →This blog outlines the new Windows Backup for Organizations feature introduced in Windows 11 by Microsoft. They replace the old “Sync your settings...
Read Article →This blog will be about a strange Autopilot failure we could reproduce again and again. Right after the Terms of Use was accepted, the device doesn...
Read Article →Strengthen your Conditional Access strategy with practical essentials. Explore how RMAUs, Named Locations, Authentication Strengths, and Service Pr...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →In late August, Microsoft plans to release the Copilot summarize email thread feature in Outlook clients without the need for a Microsoft 365 Copil...
Read Article →In this post, we’ll break down what it does, when you need it, and how to align it with your organization’s update strategy.
Read Article →Learn how to list and restore soft-deleted cross-tenant access policies in Microsoft Entra ID using Microsoft Graph PowerShell. The post Find and R...
Read Article →Microsoft will impose a throttling limit for external recipients for tenants that use MOERA domain addresses to send outbound email. The limit is d...
Read Article →This blog post is a sleeper. I documented it in 2023 and never came around to publish it. The post was always too short in my opinion, too niche. B...
Read Article →Last Updated on August 24, 2025 by Michael Morten Sonne Introduction The short announcement about Bulk User Download… The post Entra ID – Bul...
Read Article →A brief history Seamless Single Sign On was first introduced in late 2016 and provided a way for users to authenticate to Entra ID (Azure AD at the...
Read Article →I have experienced issues with some app pushing wrong WebView2 (X64) to a Win11 (ARM) machine. Then any apps that ... Read more
Read Article →See how to hide or show approver details in access packages with this new feature and easily configure it with our guide. The post Configure Whethe...
Read Article →After a report to the MSRC about some missing file data from Copilot audit records, Microsoft fixed the problem and audit records now contain detai...
Read Article →This blog will be about a lesser-known feature in Windows Autopilot: the Userless Enrollment Status. We’ll look at how devices can end up in a bloc...
Read Article →EPM has always relied on virtual accounts for elevation, often breaking scenarios where apps need the real user profile. A new ElevationAccount.Use...
Read Article →The level below automation and above manual actions per asset - So this is mostly a self reference post about the action button in Defender XDR whe...
Read Article →Discover Intune's new Multi-Admin Approval feature for device actions. This guide explains how to set up dual control for Wipe, Retire, and Delete ...
Read Article →Three new Graph API resources provide easy access to Entra ID authentication method summary data. The information is helpful to understand the type...
Read Article →This article discusses how to use PowerShell to find obsolete mobile device partnerships in Exchange Online (or Exchange Server) and remove the obs...
Read Article →Last Updated on August 20, 2025 by Michael Morten Sonne This summer has been a wonderful mix of… The post Summer Recap & Time to Reconnect fi...
Read Article →In many environments - often for historical reasons - there is no strict separation of client and server networks. And if there is a firewall betwe...
Read Article →Master Conditional Access with a Zero Trust, persona-based approach. Learn how to structure policies, avoid security gaps, and keep everything orga...
Read Article →Outlook Mobile clients have started to highlight messages received from unverified senders. But what does "unverified" mean and what can be done to...
Read Article →Last Updated on August 18, 2025 by Michael Morten Sonne Introduction Managing permissions for Managed Identities in Azure/Entra… The post Ent...
Read Article →The new GraphApiAuditEvents table in Advanced Hunting have been in Public Preview since July this year. These valuable logs give new insights into ...
Read Article →Over my last few posts, I’ve casually mentioned Authentication Context a few times, so I thought it was about time we gave the feature a proper spo...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Microsoft Defender for Office 365 (MDO) requires shared mailboxes to be licensed but doesn't extend the same requirement to Microsoft 365 Groups. G...
Read Article →Deploy the recommended settings for Windows LAPS to your end-user Windows 10 and 11 devices using Microsoft Intune. The post Recommended Settings f...
Read Article →Microsoft plans to remove the ability of users to perform mobile device management (for their devices) from the OWA and new Outlook for Windows cli...
Read Article →For a long time now, defenders had the ability to monitor behavior of human- and workload identities in Entra tenants not only through AuditLogs bu...
Read Article →Learn why Microsoft cancelled a planned change to Entra ID access package visibility after overwhelming community feedback. The post Microsoft canc...
Read Article →Finally, Microsoft solved the technical issues that blocked SharePoint Online support for sensitivity labels with user-defined permissions (UDP). T...
Read Article →One portal, scoped permissions, less Entra privilege—Unified RBAC for safer, simpler SecOps.
Read Article →Purview Priority Cleanup is growing its capabilities to be able to process files stored in SharePoint Online and OneDrive for Business. Public prev...
Read Article →Microsoft Sentinel’s data lake story is quietly powerful: you get fast, 90-day Analytics (Shortterm) for hunting and detections, plus scalable, ......
Read Article →This blog examines a login issue that may arise after the Windows 11 24H2 upgrade is complete and the device reboots. After the device reboots, the...
Read Article →Discover how Microsoft Conditional Access protects your Microsoft 365, Entra, and Azure environments. Learn the essentials, explore real-world use ...
Read Article →Use PowerShell and new Microsoft Graph APIs to visualise user MFA, SSPR, and password reset activity in your Microsoft 365 tenant. The post How to ...
Read Article →The Connect-IPPSSession cmdlet is needed to connect to the Security and Compliance endpoint to update a Microsoft 365 retention policy. Unhappily, ...
Read Article →It may be tempting to click “Enable Macros” when you open a spreadsheet, but macros are executable programs. Without a ... Read more
Read Article →A question about shared mailboxes brought up the topic of licensing requirements when a tenant has Microsoft Defender for Office 365 (MDO). The new...
Read Article →Discover the best practices for configuring PIM in Microsoft Entra. This guide will help you implement a robust and secure Zero Trust model. The po...
Read Article →Microsoft is introducing a new KeyQL-powered capability for a revamped search box in Teams. The new implementation promises faster and more precise...
Read Article →Microsoft says that few customers have installed the dedicated hybrid connectivity app that's needed to migrate from EWS. It's time to install that...
Read Article →A July 14 post announces Copilot Memory, a method to personalize how Copilot responds to user prompts. Controls are available to disable Copilot me...
Read Article →Upcoming in September 2025: Microsoft is rolling out automatic registration for Entra ID External Authentication Methods (EAMs). Find out how this ...
Read Article →After being asked whether licenses are needed to include shared mailboxes in Microsoft 365 retention policies, I investigated and found that licens...
Read Article →What is Defender for Cloud Apps. Defender for Cloud Apps aims to tackle the security problems that come with the increasing use of SaaS application...
Read Article →With the introduction of Application Based Authentication (ABA), Microsoft introduces modern authentication mechanisms to Microsoft Entra Connect. ...
Read Article →Learn why you must evolve your Conditional Access policies to properly manage risk for your passwordless users. The post Blocking risky users with ...
Read Article →If you use the Microsoft Graph PowerShell SDK, you don’t need to worry about obtaining an access token because SDK cmdlets include automatic token ...
Read Article →In recent years, an increasing number of customers have requested options to extend retention in Microsoft Defender XDR beyond the default 30 days ...
Read Article →Getting annoyed or impatient when activating eligible roles in PIM — especially multiple roles at once? You’re not alone. Today, I’m...
Read Article →Table of Contents Introduction What is PIM? Requirements Configuration Step 1: Create Group Step 2: Confirm Existing SSO Integration Step 3: Config...
Read Article →Monthly update #122 is now available for the Office 365 for IT Pros eBook. Subscribers can download PDF and EPUB files for the update from Gumroad....
Read Article →DLP diagnostics were announced in October 2024, and it’s taken quite a while for Microsoft to make the four DLP diagnostic tests available. In trut...
Read Article →Check out this article via web browser: Dynamic approval in Entra ID access packages using custom extensions Microsoft Entra ID Governance Entitlem...
Read Article →Microsoft suggests that tenants wanting to block access to OWA while allowing people to use the new Outlook should deploy a conditional access poli...
Read Article →Microsoft released the new Microsoft Sentinel data lake in public preview this month. With the data lake feature, it is possible to scale and store...
Read Article →In this blog post, I’ll walk you through troubleshooting connectivity issues with the Azure Connected Machine agent and highlight someContinue Reading
Read Article →This blog explains how to download the original IntuneWin Win32 app package from Intune when you no longer have the original source files. If you f...
Read Article →A banner posted in the Entra admin center informs administrators that Entra ID governance features used by guest accounts incur charges from June 2...
Read Article →Learn how to update your Conditional Access policies to protect your environment in preparation for updates to the Azure DevOps service. The post I...
Read Article →Learn how to migrate MFA and SSPR policy settings to the Authentication methods policy in Microsoft Entra before the legacy settings are retired. T...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →The August 2025 update for the Automating Microsoft 365 with PowerShell eBook is available for subscribers to download. The eBook now includes over...
Read Article →This blog was created in response to recent policy changes related to the WeTransfer cloud storage service. These changes raised ... Read more
Read Article →Answering some common questions people might have - Data lake is here, rejoice. It also brings up a bunch of questions, like do I still need Micros...
Read Article →In this blog, we’ll walk through a remote wipe issue that leaves devices in a lingering, unmanaged state, where the Intune object is removed, the d...
Read Article →The new Outlook for Windows now supports the NoSignOnReply control for inheritance of S/MIME signatures from messages to replies. It’s an update to...
Read Article →Linkable token identifiers is a new Entra ID feature that adds a GUID to all the audit events for a session. The new identifiers make it easier to ...
Read Article →Discover a huge win for security. Token Protection in Conditional Access is now included in Microsoft Entra P1, offering a powerful defence against...
Read Article →After writing about how to copy group memberships from one user to another, the question arises about removing members from groups. The answer is s...
Read Article →Retention policies and retention labels have been around for about 8 years. Some of the older retention settings might use file created dates to re...
Read Article →This blog will discuss a strange Windows Autopilot failure that appeared on newly installed Windows 11 24H2 devices that had been updated with the ...
Read Article →Planned Change Prevents Microsoft Tenant Domain Enumeration In a significant security-hardening move, Microsoft has altered the behaviour of its Ex...
Read Article →This blog is about a new kind of silent recovery built into Windows 24h2 (KB5062660). It’s not about Safe Mode or Startup Repair, but something mor...
Read Article →The Microsoft Authenticator app gets two important changes in September 2025 to make the app easier to use for average users. The current number ma...
Read Article →This blog will be about what actually happens when you enable the new “Remove Default Microsoft Store Packages” from the System policy designed to ...
Read Article →Table of Contents Introduction Requirements Benefits Step-by-Step Guide Examples Check Current Repository for Orphaned Branches Search all subdirec...
Read Article →Microsoft Authenticator simplifies same-device sign-ins, replacing number matching with a simple Yes/No prompt. The post Microsoft to streamline th...
Read Article →Looking beyond just the technical details - I recently did a presentation with the same title as this post and figured it would be a good idea to a...
Read Article →Find inactive guests users in your Microsoft tenant using the Entra admin center or programmatically with Microsoft Graph PowerShell. The post How ...
Read Article →The news that people can customize Teams by choosing one of ten accent colors for use in the Teams UX might or might not be positive, depending on ...
Read Article →The Exchange Extended Security Update program is a 6-month lifeline for organizations struggling to upgrade servers to Exchange Server SE. Although...
Read Article →In Defender for Office Automated Investigation and Response (AIR) is important. Microsoft has improved the features surrounding Auto-Remediation of...
Read Article →A July 15 announcement says that Exchange Online is reducing the Delicensing Resiliency threshold from 10,000 to 5,000 mailboxes. That’s fine, but ...
Read Article →When Conditional Access meets Zero Trust, even the best intentions can backfire. In this post, we explore a real-world edge case where strict polic...
Read Article →Security researchers documented a prompt injection vulnerability in an agent created with Copilot Studio that allowed the exfiltration of customer ...
Read Article →This blog will cover the latest features in MDM Enrollment Version 6.0 and explain their significance for device attestation, virtual TPMs, and Int...
Read Article →This blog post will show you how to use an Azure PowerShell script to register all required Azure Update ManagerContinue Reading
Read Article →Logic Apps allow organizations to easily automate processes, in the last blog the APIs to run KQL are discussed. This blog builds upon the knowledg...
Read Article →Check out this article via web browser: Managing PIM-enabled groups with Entra ID Governance Access Packages just got better! Just a quick heads-up...
Read Article →Microsoft 365 Copilot Search is the second iteration of Copilot Search. It borrows heavily from the older Microsoft Search in Bing feature in terms...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Last Updated on August 18, 2025 by Michael Morten Sonne Introduction As I sit down to write this… The post My First Year as a Microsoft MVP f...
Read Article →The time has come to write a blog about Entra ID Governance. There are a lot of cool functionality that can help managing Users and their permissio...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Version 2.29 of the Microsoft Graph PowerShell SDK can now be downloaded from the PowerShell Gallery. Initial tests show that the release is stable...
Read Article →The Microsoft Authenticator app is a secure authentication method for MFA. The app is getting an easier way for backup and recovery, which should m...
Read Article →A sometimes overlooked 2024 update delivers easier access to protected messages delivered to shared mailboxes. Instead of direct assignment of Full...
Read Article →In September, Microsoft are to remove the personal account requirement for backing up and restoring the Microsoft Authenticator App. The post Micro...
Read Article →Company branding isn’t just about creating a visual identity - it’s a key security measure for reducing phishing risks. In this post, I dive into h...
Read Article →Sometimes tenants need to copy group membership from one user to another. Often PowerShell is used, but with the demise of the Azure AD module you ...
Read Article →Check out this article via web browser: Poor man’s IGA: Monitor and clean up stale guest accounts Today’s challenge Today, we are dealing with inac...
Read Article →Microsoft 365 Copilot users can generate audio overviews from Word and PDF files and Teams meeting recordings stored in OneDrive for Business. Copi...
Read Article →Zero Trust is a modern security approach that assumes attackers may already be in your network and thus “never trust, always verify” every access r...
Read Article →Learn how to find poorly configured Redirect URIs in Microsoft Entra Applications and why you should secure them. The post How to Secure Redirect U...
Read Article →July 1 marked the general availability of Exchange Server SE (subscription edition), the latest in a long line of server releases going back to Exc...
Read Article →Check out this article via web browser: KB – We detected that this particular key type has been blocked by your organization This is a knowle...
Read Article →Introduction Microsoft announced on the 1st of July 2025 that the Microsoft Sentinel Azure Portal UI will be deprecated at the 1st of July 2026, an...
Read Article →Learn how to monitor for license compliance for Microsoft Entra and ensure you remain compliance with Microsoft licensing terms. The post How to En...
Read Article →The New Outlook for Windows supports an export to PST function. Unfortunately, exporting mailbox items is very slow – roughly ten times slower than...
Read Article →In this final installment of the Data Strategy Breakdown series, we dive into Entra ID and why securing your identity is crucial for a strong data ...
Read Article →Phishing, malware, and social engineering remain among the most common entry points for cyberattacks. While technical safeguards play a crucial rol...
Read Article →The MCP server for Microsoft Learn is available in public preview. It can be installed to allow AI agent real-time access to Microsoft documentatio...
Read Article →This blog will focus on the new Windows 11 25h2 feature, “Remove Default Microsoft Store Packages.” It’s a long-awaited Group Policy and (eventuall...
Read Article →Office 365 for IT Pros (2026 edition), the 12th in an eBook series going back to May 2015, is now available. Covering all the essential aspects of ...
Read Article →This blog explains how the Intune Management Extension (IME) handles the cleanup of the IMECache folder after it has finished installing a Win32App...
Read Article →The Office 365 for IT Pros team are thrilled to announce the availability of Automating Microsoft 365 with PowerShell (2nd edition). This completel...
Read Article →In this blog post, I’ll walk you through removing the Azure Arc Connected Machine agent from a Windows machine and cleaning up all related folders,...
Read Article →Trusted locations are the foundation of location-based security policies and risk in Microsoft Entra, learn how they enhance the user experience. T...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Last Updated on June 29, 2025 by Michael Morten Sonne Introduction A throwback tool built for real-world IT… The post 🛠️ Releasing my legacy ...
Read Article →Agent governance is the framework that allows tenants to deploy agents safely, securely, and under control. A new ISV offering from Rencore helps t...
Read Article →The conditional access policy condition for token protection now extends to Microsoft Graph PowerShell SDK interactive sessions. Any account within...
Read Article →Recent problems with Microsoft 365 PowerShell modules afflicted the ability of Azure Automation runbooks to execute cmdlets Microsoft Graph PowerSh...
Read Article →Learn why you should and how you can disable Seamless SSO in Microsoft Entra Connect to improve security in your environment. The post Why you shou...
Read Article →If you’ve ever run into an Autopilot Unexpected Reboot right after Device setup, before the account setup even starts, you’re not alone. This post ...
Read Article →We're a week away from the launch of the Office 365 for IT Pros (2026 edition) eBook, the 12th edition issued since the first book appeared in 2015...
Read Article →Intro This week I bumped into a problem that I had not experienced for several years at one of my customers. The customer was migrating from a 3rd-...
Read Article →Table of Contents Introduction Requirements Benefits Step-by-Step Guide Conclusion Introduction As someone who’s spent way too much time trou...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →This blog covers a weird issue where Windows Update client policies deployed through Intune began to fail after devices were upgraded to Windows 11...
Read Article →Among the blizzard of Copilot changes is one where Outlook can summarize attachments. That sounds small, but the feature is pretty useful if you re...
Read Article →Last Updated on June 28, 2025 by Michael Morten Sonne Introduction I’m happy to share something I’ve been… The post Inside My Toolkit: ...
Read Article →Last Updated on June 21, 2025 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Introducing Az...
Read Article →Learn about the new Passkey Profiles features of Passkeys in Microsoft Entra to provide group-based Passkey flexibility. The post Configure Passkey...
Read Article →In July, Microsoft plans to introduce an app consent policy to stop users granting access to third-party apps to their files and sites. Letting use...
Read Article →Learn how to configure the require admin consent for third-party apps accessing files and sites and understand the impact to your business. The pos...
Read Article →Microsoft 365 tenants with Entra P1 or P2 licenses can use a custom banned password list to stop people using specific terms in their passwords. Th...
Read Article →On June 16, Microsoft announced European sovereign solutions, including a new offering called Microsoft 365 Local that has nothing to do with Micro...
Read Article →People Skills is a new Microsoft 365 solution that uses AI to determine what skills are possessed by users based on their profile and activities. T...
Read Article →Copilot Studio Agents can use files as knowledge sources to reason over when they respond to user prompts. We explain how to use the monthly PDFs i...
Read Article →Learn how to conveniently manage mail attributes for cloud mail users after decommissioning your hybrid Exchange Server. The post How to Remove Exc...
Read Article →The AI-based generative summaries featured by Google and other search engines remove organic traffic from technology websites and make it less attr...
Read Article →Table of Contents Introduction Requirements Features How does it work? Interactive Authentication Client Secret Authentication Certificate Authenti...
Read Article →This blog started with a support case from a customer who ran into an issue where Autopilot Device Preparation (AP DP) got stuck at “Installing req...
Read Article →In this blog post, you’ll learn how to resolve the error that occurs when updating or creating dynamic scopes forContinue Reading
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Table of Contents Introduction Requirements Benifits Step-by-Step Guide Conclusion Introduction As an IT professional, diagnosing performance issue...
Read Article →Sometimes it's hard to get a response back from running a Graph API request with the Invoke-MgGraphRequest cmdlet. Graph Explorer helps. So does re...
Read Article →The old Set-MsolCompanySettings cmdlet is no more, so how can a Microsoft 365 tenant block email-based subscriptions? With the Graph, of course! Se...
Read Article →In today’s blog, we’re diving into the world of hunting through APIs. In the blog, the advantages, limitations, and scopes of the Graph...
Read Article →Check out this article via web browser: Poor man’s IGA: Generate Temporary Access Pass for joiners Today’s challenge Today, we look at a join...
Read Article →Prepare for the deprecation of Basic Authentication in Exchange Online by September 2025. Start detect legacy sign-ins (including ROPC) using Micro...
Read Article →After July 1, 2025, any sharing links generated with one-time passcodes (OTP) will stop working. Only links based on Entra ID B2B Collaboration wil...
Read Article →In Part 4 of the Data Strategy Breakdown Series, we explore how Defender XDR and Intune in your data strategy can transform security operations. Fr...
Read Article →An OWA mailbox setting is available to block PST access for the new Outlook for Windows client. The setting mimics controls available for Outlook c...
Read Article →Today, I’ll take a closer look at Microsoft Entra Administrative Units (AUs) and Restricted Management Administrative Units (RMAUs)...
Read Article →What’s new:– Inspired by Yong Rhee “Resolving High CPU Utilization in MDE” session, added additional options to run the Per...
Read Article →The need for more nuanced responses to Teams chat and channel messages can apparently be met through multiple emoji reactions instead of a basic on...
Read Article →Microsoft announced the GA for the new message tracing feature on June 3. The old code will be deprecated in September 2025, so it's time to update...
Read Article →Learn how to enable Token Binding for securely connecting to Microsoft Graph PowerShell with Token Protection. The post How to Enable Token Binding...
Read Article →A recent post revealed that the Mailbox Import-Export Graph API doesn't capture audit events for its operations. The API is in beta, but this is di...
Read Article →Check out this article via web browser: Poor man’s IGA: Revoke all refresh tokens for user Today’s challenge Today, we look at Microsof...
Read Article →The new TwoClickMailPreviewEnabled setting in the Exchange organization configuration controls if OWA and the new Outlook for Windows use two-click...
Read Article →Monthly update #120 (June 2025) is available for the Office 365 for IT Pros eBook. This is the last update for the 2025 edition as the 2026 edition...
Read Article →A little primer to pushing and pulling new content via the graph beta API - Jumping straight into this one, custom detection rules are similar to a...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Learn how to use PowerShell to verify the authentication method your Entra Connect configuration is using to connect to Entra. The post How to Tell...
Read Article →Microsoft will launch the aiInteractionHistory Graph API (aka, the Copilot Interaction Export API) in June. The API enables third-party access to C...
Read Article →Last Updated on August 1, 2025 by Michael Morten Sonne Introduction Yes finally, it’s here! No more need… The post Entra ID – Entra Con...
Read Article →A user reported that a script didn't list any details of hidden group memberships and asked why. The reason is that a separate Graph permission con...
Read Article →In this blog post, you’ll learn how to use an Azure PowerShell script to automatically register all the necessary AzureContinue Reading
Read Article →In today’s hybrid work environment, secure collaboration is more crucial than ever. Over-sharing, under-securing, and mismanaging collaboration too...
Read Article →A set of 80 mysterious SharePoint Embedded containers turned up because Microsoft pre-provisioned storage for files used as knowledge sources by Co...
Read Article →The prospect of agents running amok in Microsoft 365 tenants lessened a tad with the introduction of Entra Agent ID. Tenants will be able to manage...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Managing external users is one of the most tedious—but also critical—challenges in a Microsoft Business Premium environment. With...
Read Article →The Teams Discover Feed highlights unread items from channels that users might have missed. Microsoft tweaked the feature so that it only works wit...
Read Article →I have been playing around with integrating AI into my favorite scripting tool: Powershell. This blog serves as a quick-guide ... Read more
Read Article →I have been banging my head why some machines wouldn’t deploy Windows 11 Windows Feature Updates (24H2) as part of ... Read more
Read Article →Last Updated on May 23, 2025 by Michael Morten Sonne Introduction Managing Azure Arc Connected Machine Agents just… The post Azure Arc – Intr...
Read Article →The June 2025 update for the Automating Microsoft 365 with PowerShell eBook is now available. Coding automation with Microsoft 365 PowerShell can b...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →The update to allow team members to add a Loop workspace as a channel tab is now rolling out and should be available worldwide soon. Microsoft is c...
Read Article →Table of Contents Introduction Requirements Features How does it work? Interactive Authentication Client Secret Authentication Certificate Authenti...
Read Article →A new feature of the Quest On Demand migration suite supports the tenant-to-tenant migration of Exchange and SharePoint content protected by sensit...
Read Article →Check out this article via web browser: Unlocking the Power of employeeHireDate in Entra ID Dynamic Groups Disclaimer: The main structure of this b...
Read Article →Table of Contents Introduction Requirements Features How does it work? Interactive Authentication Client Secret Authentication Certificate Authenti...
Read Article →Use the CA Policy Copier browser extension to conveniently copy and export Conditional Access policies to JSON. The post Export Conditional Access ...
Read Article →Some sites picked up the Microsoft 365 Copilot penetration test that allegedly proved how Copilot can extract sensitive data from SharePoint Online...
Read Article →Two new service plans are now in the Microsoft 365 Copilot license to allow users access to Viva Insights. The new service plans enable the Copilot...
Read Article →Learn how Windows Autopatch lets you orchestrate updates for Windows, Microsoft 365 Apps, Microsoft Edge, and Teams. All from a single automated so...
Read Article →This week's Microsoft layoffs provide a timely reminder to review how to retain and secure ex-employee data. OneDrive for Business might be the big...
Read Article →On May 10, 2025, Microsoft released V2.28 of the Microsoft Graph PowerShell SDK in the hope that the new version would fix a bunch of annoying prob...
Read Article →Litigation holds can retain mailbox data, but that's it. You can swap litigation holds out for a Microsoft 365 retention policy and gain extra func...
Read Article →Last Updated on May 13, 2025 by Michael Morten Sonne Introduction Here is a small update on my… The post Entra ID – Managed Identity Permissi...
Read Article →The ConditionalAccessPolicy setting in an OWA mailbox policy can be configured to work with Entra ID conditional access so that OWA blocks access t...
Read Article →How to create an Access Package that enables you to become eligible for a PIM enabled group in Microsoft Entra. The post Eligible PIM Enabled Group...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →An article by a company specializing in penetration tests raised some questions about how attackers might use Copilot for Microsoft 365 to retrieve...
Read Article →Check out this article via web browser: Register Yubikeys on behalf of your users with YubiEnroll In an earlier post, I showed several ways to (bul...
Read Article →Copilot usage data can be pretty sparse, but it's easy to enhance the data to gain extra insight into how Microsoft 365 Copilot is used within a te...
Read Article →You can now use custom extensions to enable an external system to determine the approver of an Access Package in Microsoft Entra. The post Use Cust...
Read Article →Microsoft recently announced the deprecation of the Exchange cmdlets to search for mailbox audit data. The audit data is ingested into the Microsof...
Read Article →In this blog post, you’ll learn how to keep the Azure Connected Machine agent up-to-date on Azure Arc-enabled Windows servers,Continue Reading
Read Article →A rapid-fire guide to basic security hygiene in Microsoft 365. This no-fluff checklist covers MFA, legacy auth, admin protection, spoofing preventi...
Read Article →During my work with customers, when I explain the tenant allow and block features in Microsoft Defender for Office 365 P1/P2, I often get the quest...
Read Article →Some new Graph APIs were announced on April 1 to close a feature gap with EWS. The new APIs permanently remove mailbox items and other objects, inc...
Read Article →At Ignite 2024, Microsoft said that Copilot for Microsoft 365 tenants would benefit from SharePoint Advanced Management (SAM). What does that mean?...
Read Article →Check out this article via web browser: How to restrict Device Code Flow in Entra ID For good reasons, device code flow in Entra ID is getting a lo...
Read Article →With ClickFix being one of the popular delivery methods for malware, infostealers and state-sponsored hackers it is time to share a blog on investi...
Read Article →First introduced in March 2025 to block access to sensitive documents by BizChat, Microsoft has extended the DLP policy for Copilot to cover the we...
Read Article →Last Updated on May 4, 2025 by Michael Morten Sonne Introduction 🧑💻 I’m excited to share that I’m… The post Time for a new lab envirom...
Read Article →Learn how to find least privileged Microsoft Entra roles for Microsoft Graph API delegated permissions to align with best practice. The post Find L...
Read Article →Last year, Microsoft removed the need to have a General channel in a team. Now the General channel is making a comeback, and you can choose to have...
Read Article →Subscribers for Office 365 for IT Pros (2025 edition) eBook can download the May 2025 updates (#119) now. Update #11.3 for the PowerShell book is a...
Read Article →In this first post, we explore how to create a strong data security foundation using defence in depth and Zero Trust strategies. With identity now ...
Read Article →Together with Thijs, I gave our updated session on how we architect a SOC on top of Microsoft Defender XDR and Microsoft Sentinel. Since there were...
Read Article →The Direct Send feature allows apps and devices to send unauthenticated email via Exchange Online to internal receipts. Microsoft doesn’t want unau...
Read Article →Microsoft will retire Exchange Web Services (EWS) from Exchange Online on October 1, 2026. A new usage report helps tenants understand what apps us...
Read Article →Update #11 for the Automating Microsoft 365 with PowerShell eBook is now available for subscribers to download. The eBook is now over 300 pages lon...
Read Article →Hi there! Welcome (back) to my blog series about building a connector using Microsoft’s Sentinel Codeless Connector Platform (CCP). In the previous...
Read Article →Managing new guest accounts can be a daunting task—especially when you’re dealing with high turnover, distributed teams, or unknown user...
Read Article →Block direct send capabilities in Exchange Online and encourage stronger email authentication for devices and applications. The post How to Block t...
Read Article →Learn how to prevent application owners in Microsoft Entra create new client secrets or certificates on their application. The post How to block th...
Read Article →Introduction I recently followed a live session of Dirk-Jan Mollema and Ceri Coburn on how Windows Hello for Business can be abused as a non-privil...
Read Article →Microsoft 365 Copilot will soon introduce a feature to fix spelling and grammar errors with one click. At least, that's the promise when Microsoft ...
Read Article →Litigation holds were great when introduced with Exchange 2010. Fifteen years on, better methods exist to preserve user information, like eDiscover...
Read Article →Microsoft's April 17 announcement that OWA in Exchange Server will not support access to online archives after May 12, 2025, surprised quite a few ...
Read Article →When we talk about data security, we’re essentially talking about cybersecurity at large - because data is what the bad actors are ultimately after...
Read Article →Microsoft is introducing a Dedicated Exchange Hybrid App to facilitate the transition away from EWS to use Graph API requests for rich hybrid coexi...
Read Article →Microsoft Secure Score helps organizations get insights into security posture based on security-related measurements. Microsoft Defender for Identi...
Read Article →The last thing you want on a Saturday morning is to find that Entra ID has blocked your account because of leaked credentials. Even though the acco...
Read Article →How to use getMetricsForConditionalAccessBlockedSignIn Graph API to report Conditional Access blocked sign-in metrics. The post Report Conditional ...
Read Article →In this blog, we will examine how a recent big Windows change was introduced to meet Digital Markets Act (DMA SSO Compliance) requirements. This ch...
Read Article →Entra ID populates the sponsor property for new guest accounts with details of the person who invites the guest to the tenant. It's data that can b...
Read Article →Microsoft is making some important changes to Purview eDiscovery from May 26, 2025. The changes affect how content searches work and are likely to ...
Read Article →Introducing the Microsoft.Graph.Copilot PowerShell module to help with interacting with Copilot related Graph APIs. The post Introducing the Micros...
Read Article →Microsoft Purview makes it easy to apply sensitivity labels to Office documents and PDF files with auto-label policies. Licenses are needed for aut...
Read Article →Last Updated on April 15, 2025 by Michael Morten Sonne First off — thank you so much for… The post 🚀 A huge thank you — and a little update b...
Read Article →This post provides everything you need to ensure Advanced Auditing is fully configured and auditing everything we possibly can for both existing an...
Read Article →Microsoft will disable service principal-less authentication in March 2026. This step closes a hole that doesn't exist today but might in the futur...
Read Article →V2.26 and V2.26.1 of the Microsoft Graph PowerShell SDK were low-quality, buggy disasters. Microsoft aims to fix the problem in the next version to...
Read Article →Intro While reviewing Defender for Servers and AMA agent implementations across various customers, I noticed that not all of them are following bes...
Read Article →Last Updated on April 13, 2025 by Michael Morten Sonne Introduction Service accounts are often the unsung heroes… The post Defender for Ident...
Read Article →Start implement Microsoft's Attack Surface Reduction (ASR) policies today!
Read Article →The Microsoft E5 Security add-on is available for Microsoft 365 Business Premium (and other) tenants. The add-on looks like a bargain because the b...
Read Article →Any site member can create a SharePoint agent. There’s no out-of-the-box method to report the creation of agents, but agents are created like any o...
Read Article →In this blog, we will examine why Windows shows the “Continue to sign in?” prompt when launching apps like Edge or Company Portal for the first time
Read Article →Often Microsoft 365 tenants have large numbers of old but confidential documents that they need to protect and stop Microsoft 365 Copilot finding. ...
Read Article →Microsoft Purview isn’t just another tool you switch on and walk away from. It’s a full-on transformation.
Read Article →Use Microsoft Graph PowerShell to identify Entra applications that have owners who are not privileged users. The post How to find non-privileged ap...
Read Article →File sharing is at the heart of SharePoint Online. Being able to report file sharing events by analyzing the audit log is a good skill for Microsof...
Read Article →Table of Contents Introduction What’s New in the V2? Intune vs Local Comparison – No More Policy Guesswork Detecting Duplicate and Conflictin...
Read Article →Microsoft Defender for Office 365 includes many tools to help investigators manage threat. The Email Preview tool shows the layout and appearance o...
Read Article →Since the release of Entra Private Access, I have been getting more and more questions about the future of the Entra App Proxy. Will it still be ne...
Read Article →The Conditional Access Optimization Agent is one of 6 Security Copilot agents unveiled by Microsoft on March 24, 2025. The idea is that the agent c...
Read Article →👮 Restricted Management Admin Units (RMAU) in #EntraIDHackers HATE This Hidden Entra ID Feature Most Admins Never Use@NathanMcNulty breaks it down ...
Read Article →With authentication & authorization covered in the previous posts of the series, it's now time to dive into strengthening our password...
Read Article →Neither Outlook nor Teams includes a transfer meeting ownership feature for user calendars. Moving meetings owned by an ex-employee to give someone...
Read Article →Restricted Content Discovery (RCD) is a solution to prevent AI tools like Microsoft 365 Copilot and agents accessing files stored in specific sites...
Read Article →The April 2025 Update for the Office 365 for IT Pros eBook is now available for subscribers to download. This is monthly update #118 for Office 365...
Read Article →A reader asked if it's possible to discover who made retention label assignments for SharePoint files. The Files Graph API can't tell you who (or w...
Read Article →Use the QuickPIM Google Chrome extension to select and activate multiple PIM roles in Microsoft Entra at the same time. The post QuickPIM a multi-r...
Read Article →You know that saying "another day, another dollar"? Pretty sure when the songwriters came up with that, they weren’t talking about...
Read Article →The February 2025 EX1015484 incident explains why mail user objects with duplicate SMTP addresses are created for guest accounts. That’s a problem ...
Read Article →Artificial Intelligence and PowerShell should be a good thing to help hard-pressed Microsoft 365 tenant administrators cope with common tasks. The ...
Read Article →It was such an honor to join Merill Fernando on Entra Chat, and I hope to join him again in the future. Be sure to check out Entra Chat: https://en...
Read Article →With the use of Security Copilot, it is possible to enrich and triage alerts automatically using GenAI data. Microsoft recently developed new SOC a...
Read Article →Microsoft 365 users can connect their OneDrive for Business account to ChatGPT. This is not a great thing because it exposes the potential for sens...
Read Article →Last Updated on March 25, 2025 by Michael Morten Sonne Intoduction 🥳 Exciting News! Trusted Signing has launched… The post Microsoft Azure – ...
Read Article →Connect to multi-tenant apps using a managed identity using Microsoft Graph PowerShell with the MiToken PowerShell module. The post New MiToken Gra...
Read Article →Intro Microsoft recently announced that OAuth applications are now integrated into the attack path experience within Exposure Management. This...
Read Article →Teams Windows and Mac desktop clients have started to prompt users about location privacy. Location data is used by several Teams features like the...
Read Article →Introduction In today’s evolving threat landscape, cybercriminals continuously exploit vulnerabilities in systems and applications. Attack Surface ...
Read Article →Hey there, glad to see you’re still with me on this journey! If this is your starting point, you might want to considered reading the previous part...
Read Article →Artificial intelligence (AI) tools and Large Language Models (LLM) behind those tools have become a talking point and for some, the new Google sear...
Read Article →Microsoft is tweaking the auto-hide inactive channels feature to make it less automatic and more user controllable (opt-in). It's a good change for...
Read Article →Introduction Microsoft Purview is stepping up its game again, and this time, they’re bringing data security to the network layer and...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Microsoft has given the Copilot for Outlook UI a revamp to make the UI easier to use. The new UI is certainly better and reveals the option to rewr...
Read Article →The DLP policy for Microsoft 365 Copilot blocks access to sensitive files by checking for the presence of a sensitivity label. If a predesignated l...
Read Article →Recently, Microsoft announced a new protection plan for AI workloads as part of the Microsoft Defender for Cloud suite. AI security is becoming mor...
Read Article →Quickly report on all Enterprise Application Permissions and Activity using this Free script in Microsoft Entra. The post Create a free Enterprise ...
Read Article →Hey there, welcome back! In this blog series I’ll show you how you can make your own Sentinel Codeless Connector Platform (CCP) connector. If you h...
Read Article →Introduction This blogpost is probably the first of a series that I will create in the coming months on Device Discovery. I regularly see organizat...
Read Article →Have you seen Azure environments with resources that have public access allowed or just some limitations to the IP addresses in place? Well, I have...
Read Article →In Part 02 , we explored authentication , the process of verifying user identities—ensuring users are who they claim to be. Today we’ll...
Read Article →Microsoft 365 makes it easy to remove domains. However, if you remove a domain and don't adjust email proxy addresses, some fix-up might be needed ...
Read Article →The Facilitator agent can make sense of the messages posted to a Teams chat and summarize the discussion and extract to-do items and unanswered que...
Read Article →This little guide will show how you can authenticate with Windows Hello for Business and FIDO2 security key in a ... Read more
Read Article →As cloud computing becomes more integrated into our daily operations, the importance of securing identities in Azure can’t be overstated. Gone are ...
Read Article →Hey there! In this blog series I’ll be going to walk you through a step by step guide on how to build your own Codeless Connector Platform (CCP) da...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Last Updated on March 17, 2025 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Signtool GUI ...
Read Article →Microsoft says that the Report Button is now available for all Outlook clients and it's time to remove the old Report Phishing and Report Message a...
Read Article →Introduction: Setting the Stage for Microsoft’s Secure Future Initiative
Read Article →Avoiding data breaches starts with knowing what not to do. In this guide, we break down the common mistakes in Data Loss Prevention that even exper...
Read Article →Microsoft has announced that the SharePoint Online PowerShell module will be upgraded from the very old and now obsolete IDCRL protocol to use mode...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →The new message recall facility has been around since 2022. Even after Microsoft revamped the feature in 2023, it's still only possible to recall p...
Read Article →It's been a while since I have written a new blog. Today, I will discuss about Microsoft Defender Vulnerability Management add-on.
Read Article →Outlook Newsletters are intended for internal communications, at least for the preview. It's possible to take the HTML for a newsletter and send it...
Read Article →Use this free Microsoft Graph PowerShell script to create an interactive authentication methods report for Entra users. The post Create a free inte...
Read Article →Microsoft has enabled a one-year retention policy for Teams meeting attendance reports. Tenants can't opt out of the policy or set a different rete...
Read Article →How Microsoft / Intune is shifting to Declarative Device Management (DDM) by using the declared configuration service
Read Article →Exchange Online is imposing a new tenant-wide limit of 3,000 Dynamic Distribution Groups. Few tenants might be affected, but the question might be ...
Read Article →Check out this article via web browser: Evilginx loves Temporary Access Passes too Evilginx is known for capturing user cookies, even if they are s...
Read Article →Colored folder icons does not seem like a new feature that should appear in an email client that's been around for a long time, but the new Outlook...
Read Article →A change made in late 2024 allows Microsoft 365 tenants to use IOS build numbers in Exchange ActiveSync device access rules. Apparently, the idea i...
Read Article →Outlook Newsletters is an app for the new Outlook and OWA that allows users to create and send good-looking newsletters to internal recipients. It’...
Read Article →Easily identify wasted Microsoft 365 licenses with this free PowerShell script to generate an interactive HTML report. The post Create a Free Inter...
Read Article →The developers rushed out Version 2.26.1 of the Microsoft Graph PowerShell SDK to fix some obvious issues. Alas, problems persist in PowerShell SDK...
Read Article →Microsoft Defender XDR includes a powerful response capability with the name Attack Disruption. As part of the Defender XDR solution attack disrupt...
Read Article →In my last post I covered how to monitor the GOD Mode in Azure (Coined by the great John Savill ). While visibility and monitoring are...
Read Article →The Office 365 for IT Pros writing team is thrilled to announce that monthly update #117 for March 2025 is now available for subscribers to downloa...
Read Article →There's no doubt that SharePoint Online sites and OneDrive for Business accounts hold lots of old files. A new On Demand Classification PAYG servic...
Read Article →A look into how we can utilize Maester to secure our Azure Tenant with a sprinkle of AI on top - Welcome back! This time, I’m writing a contributio...
Read Article →Do you know that moment? You’ve got your Intune environment perfectly set up, Autopilot profiles configured, and you think, ‘Yes, world...
Read Article →SharePoint Online will add support for files protected with user-defined permissions from March 2025. This step will enable support for Microsoft S...
Read Article →Microsoft 365 Archive will no longer charge fees to reactivate archived SharePoint Online sites after March 31, 2025. The good news might encourage...
Read Article →Check out this article via web browser: Things you should know before rolling out device-bound passkeys in Microsoft Authenticator App As passkeys ...
Read Article →Learn how to use Microsoft Graph PowerShell to bulk provision the QR Code method authentications for users. The post How to bulk provision QR code ...
Read Article →A bunch of problems with V2.26 of the Microsoft Graph PowerShell SDK V2.26 make the software unusable. Not only did Microsoft do a horrible job of ...
Read Article →In this blog (not technical this time…sorry), we’ll explore why Microsoft does NOT support Device Enrollment Manager (DEM) for Autopilot, the...
Read Article →Free downloads of Office 365 for IT Pros, normally in PDF format, are available from sites around the internet. All are illegal and outdated copies...
Read Article →This post will show you two very useful workspace transformation rules that you can use to save money on your data ingestion in Microsoft Sentinel....
Read Article →Exchange Web Services (EWS) will retire in October 2026. Tenants that still need to use EWS must explicitly set EWSEnabled to true in the organizat...
Read Article →Its time to start my blog… 🥳 It has been some time since I had a blog. I have been writing into company blogs and LinkedIn but the idea brewe...
Read Article →Learn how to convert a PSCustomObject to a Hashtable in PowerShell making it filterable using the Where cmdlet. The post How to convert PSCustomObj...
Read Article →Some people get great results from AI tools like Microsoft 365 Copilot. Others struggle to make Copilot useful. As an article by a Microsoft produc...
Read Article →If you’ve ever tried troubleshooting a single device, you know how useful tools like Single Device Query can be pretty helpful. It’s fast, accurate...
Read Article →Many examples are available online to explain how to add a single attachment to messages using the Microsoft Graph PowerShell SDK. Here we look at ...
Read Article →Intro Lately, I’ve been exploring Microsoft Exposure Management, particularly the data available in the Enterprise Exposure Graph. One intere...
Read Article →Learn how to find over licensed accounts with privileged roles in Microsoft Entra using Microsoft Graph PowerShell. The post How to find over licen...
Read Article →Elevating access to manage Azure subscriptions is a valuable tool for administrators, particularly when dealing with unknown or orphaned...
Read Article →The Automating Microsoft 365 with PowerShell eBook is now at update #9. The latest update spans 300 pages of content covering how to use PowerShell...
Read Article →Microsoft has announced the removal of events alerts from the Purview Audit solution. Fortunately, the decision doesn't affect activity alerts. Aud...
Read Article →Introduction If you are working with Microsoft security solutions, you might have heard of the new kid on the block called Microsoft Global Secure ...
Read Article →Since August 2024 there has been a sophisticated phishing campaign actively leveraging the device code authorization flow. Currently, there is a wi...
Read Article →The Microsoft Graph PowerShell SDK offers developers easy access to data across the Microsoft 365 ecosystem and that’s good. However, there's a pro...
Read Article →SharePoint Online is basically a big Azure SQL application. Custom columns for sites and libraries enhance metadata and are even better if they're ...
Read Article →Microsoft Defender for Endpoint (MDE) is part of Microsoft Defender XDR and can be deployed via multiple configurations. During my experience with ...
Read Article →A new preview option in the Entra admin center supports the ability to update multiple Entra ID accounts. You can update properties, add managers a...
Read Article →Check out this article via web browser: Conditional Access risk policies. Don’t get fooled! Microsoft Entra ID Protection and Microsoft Entra...
Read Article →With the increasing reliance on mobile devices in the workplace, organizations must choose the right strategy to manage and secure corporate data. ...
Read Article →Microsoft have released new bulk edit functionality in the Microsoft Entra admin center, check out how to use it and how it works. The post New bul...
Read Article →An article about the horrible devastation that an attacker can wreak inside a compromised Microsoft 365 tenant highlighted how protected actions ca...
Read Article →In this primer, we cover how to create and execute Azure Automation Exchange Online runbooks (scripts) using cmdlets from the Exchange Online manag...
Read Article →In the first part of this series, we laid the foundation for securing Microsoft Business Premium environments, covering the core security...
Read Article →OAuth apps are still an important target for attackers to misuse in organizations. Since the MFA baseline is improved with number matching and addi...
Read Article →The Maester project continues to prosper with a bunch of new features added, including several in the DevOps space. Maester usually tests tenant se...
Read Article →Last Updated on February 6, 2025 by Michael Morten Sonne Introduction I’m beyond excited to announce that the… The post 🚀 Managed Ident...
Read Article →Speaking at my very own event, that was something else! I brought my session about how Microsoft Defender for Endpoint and Global Secure Access to ...
Read Article →A new people administrator role is available in Entra ID. The new role allows holders to manage settings associated with people, like pronouns and ...
Read Article →Learn how to register a QR code authentication in Microsoft 365 and enforce the policy via Conditional Access. The post How to register for QR code...
Read Article →Entra ID retains audit log records for service principal signins for 30 days. The audit data can reveal some interesting insights such as the prese...
Read Article →I was honored to bring my session on how Microsoft Defender for Endpoint and Global Secure Access can be used together to have better network detec...
Read Article →A set of new granular Graph permissions for User account management is now available to handle common operations like changing account passwords or...
Read Article →Microsoft adds protection for permanently delete objects, which can no longer be restored using Protected Actions in Microsoft Entra. The post Prot...
Read Article →Intro Encountering a false negative during a customer engagement can be a critical issue. Recently, I faced a similar situation where a particular ...
Read Article →Monthly update #116 (February 2025) is available for the Office 365 for IT Pros eBook. The refresh includes update #8 new files for the Automating ...
Read Article →Protecting highly critical configurations in our Entra tenants has never been easier! Join me as we explore Protected Actions in...
Read Article →Using Microsoft Graph PowerShell to filter the Entra sign-in logs to find multi-tenant applications using weak sign-in methods. The post Find multi...
Read Article →I absolutely love the SCCM Operational collections from System Center Dudes, and while Intune has a different design that negates the need for scop...
Read Article →Blog Content Disclaimer 🤖 All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as ...
Read Article →Log Analytics workbooks are pretty intuitive, but KQL is one of those things that can take a while to learn and use effectively. One of the coolest...
Read Article →Last Updated on January 31, 2025 by Michael Morten Sonne Introduction During my time in IT, I’ve occasionally… The post Microsoft Azure – Ele...
Read Article →Microsoft reannounced the Teams policy to suppress certain categories of in-product advertising messages but has done nothing to control Teams pop-...
Read Article →Learn about the new People Administrator roles recently announced by Microsoft as a built-in Microsoft Entra role. The post Microsoft announce new ...
Read Article →Microsoft’s FY25 Q2 results featured bumper Microsoft Cloud revenues, which broke the $40 billion mark for the first time. Although they wanted to ...
Read Article →Learn how the Administrator Protection feature in Windows 11 uses the ShadowAdminPairs key to map ENTRA user SIDs to local admins
Read Article →Sometimes I get the question, how can I keep up with all the new actions that are added to our security solutions? This question is very valid, as ...
Read Article →This article covers how to use HVE with Azure Automation to send email. HVE is Exchange Online's High Volume Email solution for internal communicat...
Read Article →Organizations face increasing challenges in securing internet traffic and enforcing web access policies in today’s hybrid work environment. Two key...
Read Article →Last Updated on January 28, 2025 by Michael Morten Sonne Introduction What is Entra Connect Sync Connect your… The post Entra ID – New build-...
Read Article →This article describes how to use Azure Automation for audit searches. The runbook runs an audit search to find events for specific operations, ref...
Read Article →Today kicks off a comprehensive blog series where I’ll delve into the security features of the Business Premium license SKU, offering...
Read Article →This solution provides automation that ensures all available auditable events are enabled for all users in a tenant. By default, not all events are...
Read Article →Monthly update #8 is now available for the Automating Microsoft 365 with PowerShell ebook. Subscribers can download the updated files from Gumroad....
Read Article →This solution will eventually be a PowerShell module, but the initial goal was to map out all of the internal service APIs used in the Defender por...
Read Article →For a short while Microsoft allowed standard users in Microsoft Entra to change their own username. Learn how to remediate issues caused by this. T...
Read Article →Microsoft typically recommends against scheduled full scans, but there are a few scenarios where we still want to perform a full scan outside of sc...
Read Article →Three levels of detection engineering using Threat Intelligence as our guiding light - This blog will serve as a guide to understanding how we can ...
Read Article →Entra ID allows unprivileged users to update the user principal name for their accounts via the admin center or PowerShell. It seems silly because ...
Read Article →Last Updated on January 24, 2025 by Michael Morten Sonne Introduction I´m thrilled to announce the release of… The post Managed Identity Perm...
Read Article →With the introduction of a converged policy combining settings from the legacy MFA portal and SSPR configuration, separating the use of SMS for pas...
Read Article →Note Development on this solution is on hold until some other projects are finished. Plan to revisit in the second half of 2025.
Read Article →Enhancing the security of your organization’s communication channels is more critical than ever. Building on foundational protocols like SPF, DKIM,...
Read Article →After creating a runbook to process Microsoft 365 data, registering the runbook with an automation schedule means that the runbook will execute on ...
Read Article →Note This is currently being rewritten and should be completed in February 2025 :)
Read Article →This solution analyzes the output from the MDE Client Analyzer for common issue or things we might typically want to know for troubleshooting purpo...
Read Article →The second part of the Azure Automation runbook primer brings us to output, specifically how to create items generated by a runbook in a SharePoint...
Read Article →A reader asked why it seems so difficult to use Azure Automation runbooks to process Microsoft 365 data. In fact, it's not so hard, and here's a pr...
Read Article →Explore WorkplaceJoin_DualEnrollment, dual enrollment for Workplace Join devices, and the role of MMP-C Light in shifting Intune policies
Read Article →You likely aren’t collecting all available events to the Unified Audit Log :( First, not all events are enabled or retained optimally. Consid...
Read Article →Deleting an Entra ID user account can result in ownerless groups if the account being removed is the only group owner. Before deleting accounts, it...
Read Article →This blog will show how I onboarded multiple Microsoft 365 Tenants to the new MMP-C infrastructure (Microsoft Management Platform – Cloud) and expl...
Read Article →Managing emails for unlicensed admin accounts? Juggling a shared mailbox flooded with notifications from services and clients? Today’s...
Read Article →Learn how to use Microsoft Graph PowerShell to restore Microsoft Entra users and issue them a new username at the same time. The post Restore Micro...
Read Article →Privacy Policy How to contact us Should you have any questions about this privacy policy, the data we hold on your, or you would like to exercise o...
Read Article →The Microsoft 365 user profile card offers users the chance to record and playback name pronunciations, if tenant settings allow. The new setting i...
Read Article →Last Updated on January 16, 2025 by Michael Morten Sonne Introduction Microsoft Defender for Cloud Apps (MDA) has… The post Microsoft Defende...
Read Article →The Microsoft 365 Copilot Chat app is the free to use chat app available to commercial Microsoft 365 customers. The free chat app now supports Copi...
Read Article →After many twists and turns since August 2021, the MSOnline module retirement will happen in April 2025. The AzureAD module will then retire in the...
Read Article →Learn how to use Microsoft Graph PowerShell to list all directory objects, such as apps and groups a user owns in Microsoft Entra. The post List al...
Read Article →Microsoft released the SharePoint Pages API in mid-2024. This article describes how to create and publish a news item using cmdlets from the Micros...
Read Article →In January 2025, Teams will support the ability to post video clips to channel conversations in posts and replies. The feature is similar to that r...
Read Article →Introduction During my time as SOC Engineer, I do a lot of third-party data source ingestion projects for clients into their Microsoft Sentinel ins...
Read Article →If applied correctly, Threat Intelligence can be a useful tool in your belt. Mostly, however, it might be barking up the wrong tree depending on yo...
Read Article →Discover how to migrate from Symantec Endpoint Protection to Microsoft Defender for Business seamlessly with tips and tools!
Read Article →Troubleshooting a missing enterprise app issue in Entra ID during a zero-trust Conditional Access policy rollout with workaround solutions.
Read Article →The Office365ITPros GitHub repository holds over 300 PowerShell scripts showing how to interact with Microsoft 365 and Entra ID. Anyone can contrib...
Read Article →Learn how to enable new preview QR code sign-in features using the Microsoft Graph API, which supports sign-factor sign in to Entra ID. The post En...
Read Article →Here are 9 ways you can improve the multi-factor authentication deployment in Microsoft 365 for your organisation in 2025. The post 9 ways to impro...
Read Article →Microsoft is deploying the option for meeting organizers with Teams Premium licenses to use OTP verification to allow anonymous users to verify the...
Read Article →As Microsoft continues to enhance security across its platforms, Multi-Factor Authentication (MFA) is becoming mandatory for an increasing number o...
Read Article →Microsoft plans some big changes for Teams recording and transcription policies in February 2025. Events like webinars and town halls get separate ...
Read Article →Lately, I’ve been doing a lot of Defender for Endpoint deployment/configuration troubleshooting, which prompted me to dust off my MDE-Troubleshoote...
Read Article →In a modern managed workplace environment, ensuring that devices meet minimum operating system (OS) requirements is a critical aspect of security a...
Read Article →An interesting article by Microsoft’s Mark Kashman lists his top five SharePoint features shipped in 2024. Four of the five features involve extra ...
Read Article →As the season for audits approaches (though, let’s be honest, auditing should be an all-year-round endeavor), I’m excited to share a...
Read Article →Introduction Managing Apple devices in Microsoft Intune requires maintaining active integrations with Apple services. To ensure continued functiona...
Read Article →SharePoint Online intelligent versioning uses algorithms to decide what file versions must be kept for file recoverability. Unwanted versions are d...
Read Article →In the past years, malicious browser extensions have been on the rise and are more popular to be used as part of cyberattacks. With the use of mali...
Read Article →Microsoft Security Exposure Management is a new product/feature in the Defender XDR suite. This blog will explain more about it and the difference ...
Read Article →I've used Teams avatars for a couple of years but never liked them all that much. The chance to create a Teams avatar from a photo seemed like a gr...
Read Article →I’m thrilled to share the launch of the new eBook, “Demystifying Microsoft Defender for Servers” by James Agombar 🎉 I had the ple...
Read Article →Check out this article via web browser: Microsoft Entra ID Governance: Show suggested access packages in My Access Today’s post is about a ne...
Read Article →News that Viva Engage search results are included in the results generated by Office.com and SharePoint.com is not unexpected. Only certain Viva En...
Read Article →What started as a single blog is now becoming a yearly trend. More and more KQL related repositories are created, not only with a focus on security...
Read Article →Monthly update #115 is now available for download by subscribers to the Office 365 for IT Pros (2025 edition) eBook. The files available to subscri...
Read Article →Last Updated on January 2, 2025 by Michael Morten Sonne Introduction As 2024 is now over, I’ve been… The post What a 2024 – a new year is now...
Read Article →Learn how to use Managed Identities for multi-tenant app authentication when using Microsoft Graph PowerShell in Azure Automation. The post How to ...
Read Article →This blog will focus on how Wi-Fi and VPN resource access policies are being transferred (Authority change) from the old-school MDM stack to the MM...
Read Article →This module is a wrapper for the Microsoft Sentinel related Upload Indicators API, allowing you to upload indicators of compromise (IOC) to a Micro...
Read Article →Last Updated on December 23, 2024 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Managed Identity...
Read Article →Learn how to connect to other tenants using Managed Identity federation on your app registration in Microsoft Entra. The post Microsoft now allows ...
Read Article →On 19 December 2024, Microsoft announced the retirement of the Microsoft Search in Bing feature. Copilot is better at searching and presenting web ...
Read Article →In an attempt to make using MISP easier, I have created a PowerShell module to interact with MISP. The release of this module is the first step tow...
Read Article →Microsoft loves branding exercises. At least, that can be the only reason why the Microsoft 365 Copilot rename is happening. I can think of no othe...
Read Article →The Copilot inference and evaluation policy controls if users can ask Copilot in Teams to evaluate the emotions of other meeting participants. It s...
Read Article →At MC2MC Live: Forward to the past I was able to give a session on how to manage Azure Bicep templates at scale and automatically. Very happy to ha...
Read Article →Last Updated on December 19, 2024 by Michael Morten Sonne Intoduction The principle of Zero Trust emphasizes that… The post Microsoft Defende...
Read Article →Two types of retention labels are in use: Microsoft 365 retention labels and MRM retention tags. Clients hide the difference, but the Microsoft Gra...
Read Article →As the holiday season approaches and our schedules hopefully begin to open up, many of us find ourselves with a bit more time on our hands. This ti...
Read Article →Join me as I connect the dots from my previous posts on the fundamental Identity Governance features in Microsoft Entra with Lifecycle...
Read Article →On December 12, Microsoft said that they want to make the Search-UnifiedAuditLog cmdlet use high completeness for all its searches. If implemented,...
Read Article →Troubleshooting error 2147749902 (WBEM_E_INVALID_NAMESPACE) isn’t always straightforward. What started as a simple Intune error turned into a Devic...
Read Article →In January 2025, Microsoft will introduce resizable Teams windows for the Windows and Mac desktop clients. This is a fundamental change to the clie...
Read Article →Microsoft originally were going to license the Outlook Org Explorer to E3 and E5 users. Then they had the clever plan to license the feature throug...
Read Article →The SharePoint Online Block Download Policy controls the ability to use features that rely on downloaded files (including temporary files), such as...
Read Article →A February 2025 deadline looms for Outlook classic add-ins that use legacy Exchange tokens for authentication. Add-ins must switch to nested app au...
Read Article →The scheduled retirement of Delve on December 16, 2024, meant that Microsoft had to create a new way for users to update their profile settings. Th...
Read Article →Introduction As a Security Operation Center, you want to be able to contain devices and users on a network as a response to an adversary event. How...
Read Article →This blog will focus on a new Intune Core Feature called Windows Device Inventory (Resource Explorer). I will show you how this new Intune Feature ...
Read Article →In this blog post, we’ll be covering the fundamentals of Access Packages in Microsoft Entra—it’s all about getting a solid understanding...
Read Article →Microsoft's announcement of the Viva Goals retirement came as a complete surprise to the customers using Viva Goals to implement the OKR methodolog...
Read Article →Learn how to receive admin email notifications without a mailbox license using Plus addressing in Microsoft Entra. The post How to receive Entra ad...
Read Article →This blog will show you the inner workings of the Device Inventory Agent
Read Article →A recent report noted an increase in social engineering attacks through Teams federated chat. You can stop these attacks by limiting external acces...
Read Article →Check out this article via web browser: Use Requestor information in Entra ID Access Packages as input for Custom Extensions In a previous blog pos...
Read Article →Ho, ho, ho… In Germany on the 6th of December we celebrate “Nikolaus”. Kids put out one shoe the night before in the hopes that,...
Read Article →A November 26 announcement says that Microsoft 365 Video will bring Stream and Clipchamp together under the Clipchamp brand. A lot of hard work ove...
Read Article →Intelligent versioning means that SharePoint Online manages file versions automatically and only keeps what's needed. The feature works for OneDriv...
Read Article →Check out this article via web browser: Request Temporary Access Pass on behalf of others via Entra ID Governance Access Package While looking at t...
Read Article →This blog is a follow-up to the Windows Enrollment Attestation series. I’ll dive into why the AllowRecovery CSP is a game-changer and how it helped...
Read Article →Report a history of user prompts and the AI responses from Microsoft 365 Copilot using Microsoft Graph PowerShell. The post Report Copilot user pro...
Read Article →This article describes how to report the audit events for a user over a single day. The task seems simple, but inconsistency in audit payloads make...
Read Article →The Office 365 for IT Pros writing team is thrilled to announce the availability of the December 2024 update (monthly update #114). Current subscri...
Read Article →Today, we’re exploring passkeys—what they are, how they work, and how Microsoft’s latest GA features make passwordless authentication...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Introduction In a major step forward for reliability… The post Windows – Hotpatching is ...
Read Article →For red teams and adversary alike it’s important to stay hidden. As many companies nowadays have EDR agents deployed those agents are always in foc...
Read Article →This article covers how to use Exchange Online message trace data to find inactive mailboxes based on their message send activity. The script proce...
Read Article →Over the past couple of weeks I’ve been working in close collaboration with the Netskope team to build and design a new Sentinel data connector for...
Read Article →Check out this article via web browser: Evilginx Mastery Course | What I learned A couple of years back, I was really struggling to get Evilginx up...
Read Article →Learn about proof of possession and how it protects against access token replay attacks when using Microsoft Graph PowerShell. The post Proof of po...
Read Article →Intro This blog discusses a challenge I encountered with a client. They reached out for assistance in addressing issues during the deployment of De...
Read Article →Microsoft recently renamed the default set of sensitivity label permissions. Each permission defines the usage rights for a labelled item for users...
Read Article →SharePoint generates document mismatch notifications when users create or update files with sensitivity labels that are higher than the site's cont...
Read Article →Generative AI tools are nice to have, but the LLMs used by these tools must come from somewhere. The impact of generative AI on technology websites...
Read Article →The slew of product announcements at the Microsoft Ignite 2024 conference included lots about AI and Copilot. This article covers some of the more ...
Read Article →Service principal sign-in activity is a new insight available in the Entra admin center. As explained here, it's also possible to use PowerShell to...
Read Article →Check out this article via web browser: Selfservice for hardware (OATH) tokens in Entra ID. One of the longest-running previews in Entra ID is the ...
Read Article →The Purview Insider Risk Management solution can do all sorts of clever things, like tracking sensitivity label downgrades and removals as an indic...
Read Article →In a November 18 post, Microsoft describes some Exchange Online security updates that are due to land between now and 2026. Some of the news is a r...
Read Article →Deploying Windows devices using Autopilot can be challenging, especially when devices are shipped from a supplier in China to various global locati...
Read Article →In February 2025, Microsoft will begin enforcing a mandatory MFA requirement for the Microsoft 365 admin center. All connections to the Microsoft 3...
Read Article →The unified audit log is full of interesting information about who did what and when they did it. In this article, I describe how to use file opera...
Read Article →Last Updated on November 14, 2024 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post GitHub Bac...
Read Article →This article describes how to create eligible and active PIM role assignment requests using cmdlets from the Microsoft Graph PowerShell SDK. Althou...
Read Article →Learn how Graph permission scopes and Entra RBAC roles enable users access to resources in the delegated auth type scenario. The post Graph permiss...
Read Article →Intelligent versioning recently appeared in SharePoint Online. The purpose is to save storage by removing unnecessary versions. But retention polic...
Read Article →The unified audit log is a centralized repository for M365 user and admin activities. The activities originate from different applications, such as...
Read Article →Troubleshooting health attestation just got easier. With the introduction of the Tpm PreAttestationHealthCheck task, Windows now generates a detail...
Read Article →In a November 8 post, Microsoft says that Purview Data Lifecycle Management will allow tenants to split processing of Copilot interactions and Team...
Read Article →Microsoft recommends that developers move from the older DirectoryRoles Graph API and use the UnifiedRoleDefinition API instead. Changing APIs will...
Read Article →Microsoft launched private channels in November 2019. A lot has happened since, and private channels don't really get much attention these days. Th...
Read Article →A recent article about analyzing interaction records for Microsoft 365 Copilot led to the question if it’s possible to do the same for Microsoft Co...
Read Article →Look in the difference between the directoryRole and unifiedRoleDefinition APIs to understand what Microsoft is now recommending change. The post M...
Read Article →Microsoft announced Delicensing Resiliency, a new feature for tenants with over 10,000 paid seats, to avoid inadvertent data loss due to licensing ...
Read Article →Container management label support is coming to the Loop app. Before it arrives, we look at how Loop supports sensitivity labels assigned to pages ...
Read Article →Introduction In the past couple of weeks, I worked on a project where I needed to provide access to a securely private integrated Azure Storage Acc...
Read Article →When subscription activation gets stuck, it could be due to conflicting tenant accounts. This blog dives into how to fix subscription activation by...
Read Article →Group-based licensing is a mechanism to make it easier to assign and manage product licenses for large sets of user accounts. In this article, we d...
Read Article →Learn how to restrict non-admin users access to the Microsoft Entra admin portal using Microsoft Graph PowerShell. The post Restrict non-admin acce...
Read Article →Last Updated on November 2, 2024 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Managed Ide...
Read Article →Monthly Update #113 (November 2024) for the Office 365 for IT Pros eBook is now available for download by current subscribers from Gumroad.com. An ...
Read Article →Copilot agents are part of Microsoft's Wave 2 initiative launched in September 2024. Basically, an agent restricts Copilot queries to a defined set...
Read Article →In this post, I’ll show you how to streamline the Out-of-Box Experience (OOBE) setup process even if you’re using Autopilot Device Preparation ( AV...
Read Article →Last Updated on January 21, 2025 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Introducing...
Read Article →A reader asked why the Entra admin center includes an option to manage per-user MFA settings for accounts. I don't know why Microsoft added this op...
Read Article →Microsoft to enable passkeys in the Microsoft Authenticator app without the need to implement key restrictions. The post Enablement of Passkeys in ...
Read Article →Many articles describe how to disable a service plan for a product license assigned to a Microsoft 365 account, but few cover how to enable service...
Read Article →Learn how to bypass Microsoft Graph PowerShell access restrictions and gain full directory access using PowerShell. The post How to bypass Microsof...
Read Article →A reader asked how to find emails with sensitivity labels. Everyone knows that you can find SharePoint files protected by sensitivity labels, but w...
Read Article →IntroductionMicrosoft Sentinel offers a lot of features, one being the ability to manage your analytic rules (detection rules) as infrastructure as...
Read Article →On October 23rd, 2024, Patch My PC dropped their brand new Home Updater version 5.0, and it’s a serious game-changer for home users. If you’ve been...
Read Article →In this blog, I will show you how to set up the Windows Performance Recorder and the Windows Performance Analyzer to troubleshoot Autopilot and Int...
Read Article →A comprehensive analysis of security configuration assessment tools and methodologies for Microsoft Entra ID, including automated checks for condit...
Read Article →Explore advanced design patterns for implementing Conditional Access policies in Microsoft Entra ID as part of a Zero Trust security strategy. Cove...
Read Article →Introduction I am thrilled to participate in the Cyber Back to School initiative hosted during cyber awareness month! This session is all about Pri...
Read Article →Last Updated on October 25, 2024 by Michael Morten Sonne Introduction Introducing a new PowerShell tool for Managing… The post Managed Identi...
Read Article →An October 17, 2024 report highlights how Microsoft 365 Copilot can benefit SMEs in terms of increased revenue and ROI. But the report is a marketi...
Read Article →Some tips, tricks and tools to help you get started testing your own infrastructure. This is the part 1 where we'll look into identity and how you ...
Read Article →Best practices for securing workload identities including service principals and managed identities in Microsoft Entra ID. Discusses credential man...
Read Article →Directory synchronization features control how the Entra Connect tool works when synchronizing accounts from Active Directory to Entra ID. The curr...
Read Article →In this blog, we’ll explore why 0x80280009 (aka TPM_E_FAIL) is becoming a more common headache, particularly in virtual machines. We’ll look at wha...
Read Article →A recent question asked how to force users to reauthenticate at 7AM every Monday. The solution seems to revoke access for user accounts. This artic...
Read Article →Deep dive into Microsoft Entra Privileged Identity Management (PIM) covering just-in-time access, approval workflows, access reviews, and integrati...
Read Article →Comprehensive guide to Microsoft Entra ID Protection's risk detection capabilities, including sign-in risk and user risk policies, risk investigati...
Read Article →A new Cloud Licensing API has turned up in the Microsoft Graph beta endpoint. Apparently, the new API aims to improve license management in various...
Read Article →Detailed analysis of Azure Role-Based Access Control (RBAC) security considerations, including custom role design, least privilege principles, scop...
Read Article →Introduction The process is quite similar to the client secret flow described here, so be sure to take a look! The challenge here lies in generatin...
Read Article →Container management labels are an effective way to ensure that groups, teams, and sites have the right settings. The Graph doesn't support custom ...
Read Article →Learn how to report assigned license and service plans for users in Microsoft 365 using Microsoft Graph PowerShell. The post Report license usage r...
Read Article →Security considerations for external collaboration using Microsoft Entra External Identities (B2B). Covers guest user lifecycle management, cross-t...
Read Article →Copilot errors in generated text can happen for a variety of reasons, including poor user prompts. If the errors end up in documents, they can infe...
Read Article →This is an update to a previous article I wrote on hardening Azure Active Directory. The idea of this update is to provide a table of default setti...
Read Article →The Teams calendar app is being refreshed in November 2024 when Teams takes on the calendar UI used by OWA and the new Outlook for Windows. The uni...
Read Article →Copilot Pages are part of the September 2024 Copilot Wave 2 announcement. They're a good way to capture the text generated by Copilot in response t...
Read Article →Adaptive searches are a nice way to target users, sites, and groups for Purview retention processing. But a user adaptive scope can't select member...
Read Article →Introduction The next authentication flow in my series will be the Client Credentials Flow. Be sure to check out the first one here! We will first ...
Read Article →After posting the blog about Administrator Protection, one question kept coming up: What are the key differences between Administrator Protection v...
Read Article →The Exchange admin center feature to allow administrators to initiate an upgrade distribution list process to request group owners to migrate distr...
Read Article →The question of how best to write PowerShell for Microsoft 365 was asked during a TEC 2024 PowerShell workshop. There are many variables, and one h...
Read Article →Offline access is a fundamental feature for email clients. The new Outlook introduced initial support in June 2024. Now it can start without a netw...
Read Article →Microsoft announced blocked Teams federated chat for trial tenants in June 2024. That block is now well and truly enforced. If you use an account i...
Read Article →The DeviceTvmInfoGathering table in Defender XDR is one of the understudied tables of Defender For Endpoint. With only the small amount of four lis...
Read Article →The Delve browser app retires on December 16, 2024. It's time to check if the change will affect how people interact with user profiles in Microsof...
Read Article →Learn how to automatically migrate to Authentication Methods policies in Microsoft Entra using the built in Wizard. The post How to automatically m...
Read Article →The Maester tool is a great way to get a security assessment for a Microsoft 365 tenant. Being able to create custom Maester tests makes it even be...
Read Article →This blog will focus on a new Windows 11 insider build feature, Administrator Protection, announced in the latest Windows Insider Canary build (277...
Read Article →Last Updated on January 21, 2025 by Michael Morten Sonne Introduction Here at my blog, im committed to… The post Microsoft Defender for Ident...
Read Article →Unsurprisingly, Microsoft announced the deprecation of the Revoke-SPOUserSession cmdlet for November 2024. The cmdlet is replaced by the Revoke-MgU...
Read Article →Introduction When designing IaC modules finding the correct syntax to deploy a certain resource type is often not the hardest thing to do. What I f...
Read Article →Learn how to manage and deploy apps updates in the Intune Enterprise App Catalog using Microsoft Graph PowerShell. The post How to deploy Enterpris...
Read Article →SharePoint Advanced Management (SAM) is a $3/user/month add-on that can help Microsoft 365 tenants manage problems like oversharing, data governanc...
Read Article →The Outlook (classic) client has a registry setting to control moving deleted items from a shared mailbox. The new Outlook for Windows client doesn...
Read Article →I spoke together with my colleague Thijs Lecomte at Cyber back to School, where we recorded our session on how to architect a SOC on top of Microso...
Read Article →The Office 365 for IT Pros team is delighted to announce the availability of monthly update #112. Subscribers for the 2025 edition can now download...
Read Article →Windows 24H2 has been released with improvements to Windows LAPS, including new automatic account management features. The post Windows 11 24H2 rel...
Read Article →Following a change made to Microsoft Synchronization Technology to support the new Outlook for Windows, Outlook mobile supports access to archive m...
Read Article →Learn how to use PowerShell to report available Enterprise App Catalog updates in Microsoft Intune with Microsoft Graph PowerShell. The post Report...
Read Article →Get the Microsoft Graph PowerShell book and learn to master managing your Microsoft tenant with Microsoft Graph PowerShell. The post Microsoft Grap...
Read Article →TEC 2024 (aka "The Experts Conference") takes place on Oct 1-2 at the Loews Arlington Hotel. TEC is a great conference for many reasons, notably th...
Read Article →Understand the one-person, one-license philosophy for when users need to be assigned Microsoft Entra licenses in multiple tenant scenarios. The pos...
Read Article →At a recent community event, I presented a deep dive into various authentication flows in Entra Id, showcasing how to retrieve an ARC server from a...
Read Article →Some organizations want to disable OneDrive for Business to force people to use SharePoint Online. This might have been possible in the past. It is...
Read Article →In this blog, we’ll dive into the common headache of enrolling existing devices to Intune and hitting the 0x80180031 error, often caused by the fac...
Read Article →MC894577 announces that DLP policy tips displayed in Outlook will soon support a set of new conditions. That's good, but the text of the announceme...
Read Article →Last Updated on January 21, 2025 by Michael Morten Sonne Intoduction Microsoft Sentinel, a security information and event… The post Import an...
Read Article →An article described some benefits that could be gained from not installing the complete Microsoft Graph PowerShell SDK. The question is whether th...
Read Article →Have you ever struggled with Lenovo T480 or HP Elitedesk 800 G4 devices that refused to cooperate with Intune? In this blog, we unravel the saga of...
Read Article →A recent script demonstrated how to import contacts into user mailboxes using a list in a SharePoint site as the source. With a quick change, a CSV...
Read Article →Last Updated on June 21, 2025 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Introducing Az...
Read Article →The new Outlook for Windows and OWA now can suppress duplicate contacts. This means duplicate contacts are hidden, not removed. Tests reveal that d...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Microsoft's advice is to use the Get-ExoMailbox cmdlet instead of its older Get-Mailbox counterpart. Generally, this is good advice that you should...
Read Article →Recently, I was challenged to build a scalable, cloud native solution that should be used for monitoring of critical Windows ... Read more
Read Article →Understand the difference between eventual and session consistency when writing and reading changes with Microsoft Graph PowerShell. The post Under...
Read Article →Sometimes you don't need the full-fledged Graph API to report details of items in Recoverable Items and the Get-RecoverableItems cmdlet can do the ...
Read Article →This article explains how to use the Microsoft Graph PowerShell SDK to report Recoverable Items in a form that is usable for eDiscovery investigato...
Read Article →Check out this article via web browser: Register Yubikeys on behalf of your users with Microsoft Entra ID FIDO2 provisioning APIs Microsoft recentl...
Read Article →A new Entra ID photo update settings policy aims to cure the mish-mash of existing settings controlling how user profile photos are updated in Micr...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →Today, we use logging for many purposes including security hunting with SIEM (Sentinel), troubleshooting, performance telemetry, compliance reporti...
Read Article →As I have outlined in the series of blogs, Azure Logging is based on Data Collection Rules (DCRs) and Azure ... Read more
Read Article →In MC877369, Microsoft announced the availability of three Copilot usage reports in the Graph usage reports API to track usage of Copilot for Micro...
Read Article →Next week it’s time again for the annual Workplace Ninja Summit in Lucerne, Switzerland. The summit will start on Monday September 16th till ...
Read Article →The May update broke Windows Subscription Activation, causing devices to drop from Enterprise to Pro. The primary culprit was a breakdown in Multi-...
Read Article →The Microsoft 365 Licensing Report PowerShell script has been upgraded to generate detailed license information and to deal with expired license su...
Read Article →The Teams feature to hide inactive channels is now fully rolled out. Another recent change suppresses notifications from hidden channels, and this ...
Read Article →Previously the File Integrity Monitoring (FIM) feature in Defender for Server P2 was based on the MMA and/or Azure Monitor Agent. Since the MMA age...
Read Article →The Microsoft 365 admin center will support continuous access evaluation (CAE) from September 2024 to help revoke access from accounts more quickly...
Read Article →Microsoft has announced a new Sentinel feature: Summary Rules. Those rules are aimed at aggregating large sets of data in the background for a smoo...
Read Article →There are many different ways of getting your security data into Microsoft Sentinel: You can use agent based software, play around with Diagnostic ...
Read Article →eDiscovery is a calling best left to skilled investigators. But Microsoft 365 administrators need to know how to search and how the new Purview eDi...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →Struggling to get internet access from a newly deployed VM in Azure on a new subnet, then check if VM ... Read more
Read Article →One of the things that vexes me is the need to change account to attend a Teams meeting. I forget this all the time and end up with unexpected wait...
Read Article →The automatic document summary feature for Word duly turned up and Copilot for Microsoft 365 has been busy generating summaries ever since. The fea...
Read Article →Are you using a nice Windows 365 Cloud PC and want to use kickass Intune Suite features like Device Query or EPM Support Approved? If you’re ...
Read Article →Thankfully, Teams pasted text no longer contains a timestamp and the author's name. The change is effective worldwide and addresses a longstanding ...
Read Article →People often need to transfer objects or code between Microsoft 365 tenants. When it comes to dealing with objects, the Microsoft Graph PowerShell ...
Read Article →Prepare for Microsoft’s mandatory MFA with practical tips on securing accounts, migrating services, and optimizing Conditional Access.
Read Article →Files are available to download for the September 2024 update for the Office 365 for IT Pros (2025 edition) eBook. This is monthly update #111 for ...
Read Article →This Thursday, I will visit and speak at the Cloud Identity Summit in Cologne, Germany. The Cloud Identity Summit is organized by Thomas Naunheim, ...
Read Article →You may have noticed that Microsoft will enforce MFA requirement per October 15, 2024 for Azure/Entra/Intune. If this is new ... Read more
Read Article →After reaching 50% deployment and on track to general availability, Microsoft decided to withdraw the Copilot catch up feature. Catch up shows a se...
Read Article →Two powerful features have been introduced in the latest update to Microsoft Intune Advanced Analytics: CPU Spike and Memory Spike monitoring. We c...
Read Article →On August 21, 2024, news emerged that the PnP PowerShell module will transition from using a multi-tenant Entra ID app to a tenant-specific app. Th...
Read Article →Create EPM Elevation Rules in just a few seconds. It sounds like a dream, right? As IT professionals, we’re always on the lookout for ways to...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Intoduction What is Microsoft Defender for Identity Microsoft… The post Microsoft Defend...
Read Article →The ability to restore deleted groups only covers Microsoft 365 groups. That's an odd situation to be in given the different types of groups in Mic...
Read Article →This blog will be about me wrecking a Windows device during Autopilot Pre-Provisioning to see what is happening underneath. While doing so, I stumb...
Read Article →Microsoft Purview and the Exchange Online Search-UnifiedAuditLog cmdlet both perform searches of the Microsoft 365 unified audit log. Both mechanis...
Read Article →Shared mailboxes have Entra ID accounts. No one needs to sign into the accounts because Exchange Online manages connections using mailbox permissio...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →One of the most misunderstood aspects of security monitoring is determining what data sources to use for what purpose. In this post, we will go thr...
Read Article →Microsoft says that they plan to refresh the Teams external domain activity report from September 2024. But access to the report requires a Teams P...
Read Article →Entra ID Multifactor Authentication is on everyone’s mind, as Microsoft will enforce the usage of MFA for most of the Admin portals starting ...
Read Article →Follow best practice to configure your emergency access accounts in Microsoft Entra to ensure you always can access them securely. The post Best pr...
Read Article →Microsoft has continuously refined how Windows handles Subscription Activation, particularly in environments with strict Conditional Access policie...
Read Article →Microsoft announced their plan to charge for unlicensed OneDrive for Business accounts in July. Now we have an unlicensed OneDrive accounts report ...
Read Article →The decision to rationalize license management in the Microsoft 365 admin center wasn't popular but the signs are that it could deliver benefits to...
Read Article →A recent report highlighted the problem of on-premises accounts synchronized to Entra ID that receive administrative role assignments. This article...
Read Article →Microsoft's project to impose a mandatory MFA requirement for access to Azure management tools and sites will start enforcement on or after October...
Read Article →Check out this article via web browser: All you need to know about the mandatory multifactor authentication for Azure and other administration port...
Read Article →A little bit of a deconstruction of some antipatterns in Security Operations - Welcome back to another post - this time we are talking about antipa...
Read Article →The August 15 announcement that Microsoft Copilot (the version that doesn’t use the Graph) will benefit from enterprise data protection from Septem...
Read Article →I have seen big problems with KB5041578 on Windows 2019 causing disk i/o issues with massive writes to c:\windows\catroot2\edb.log. In ... Read more
Read Article →Making a little note of this in Graph API so it's easy to find for using it - In this post, we will go over how to simply add a Graph API permissio...
Read Article →Last Updated on September 28, 2024 by Michael Morten Sonne Introduction Microsoft Defender for Identity (MDI) is designed… The post Microsoft...
Read Article →The Usage Reports Graph API is now generally available, which means that it's fully supported. In other news, a Graph API is available for Microsof...
Read Article →The AuditLog Query Graph API remains in beta status but cmdlets are now available in the Microsoft Graph PowerShell SDK. This led to some oddities ...
Read Article →Learn how to check the license plan level of a Microsoft Entra tenant using the Microsoft Graph PowerShell SDK. The post How to check your tenants ...
Read Article →HVE and ECS are two competing Microsoft Cloud Email Services. At least, they seem to compete. In reality, HVE and ECS serve different target audien...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →When someone leaves a Microsoft 365 organization, the possibility exists that they leave some active Teams online meetings dangling behind them. Wh...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Last Updated on September 24, 2024 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Introduci...
Read Article →Microsoft is removing license assignments from the Entra admin center. From Sept 1, new license assignments are done in the Microsoft 365 admin cen...
Read Article →A question asked about filtering Teams apps based on their blocked status. The Teams admin center doesn't support this kind of filter and getting d...
Read Article →Microsoft are reducing the effective permissions on Directory Synchronization Accounts in Microsoft Entra, learn more about it now. The post Micros...
Read Article →Tenant administrators know that they need to deal with mailboxes and OneDrive accounts when people leave, but what about Teams chat messages? Or ra...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →In this blog, I will show you why existing GPO policies could potentially break new products like Intune Endpoint Privilege Management (EPM). I wil...
Read Article →Teams meeting transcripts are enormously helpful and are used by many features, including Copilot for Microsoft 365. Access to transcript files nee...
Read Article →When using Defender for Endpoint it is important to make sure the agent are healthy. I performed many reviews/ configurations in the past years and...
Read Article →In our previous blog, we explored how to register devices with Entra and manage them, despite certain prerequisites for using Intune. In this blog,...
Read Article →MC837081 announces that the Microsoft 365 admin center is to lose its ability to send password in email after updating a user account. It’s the rig...
Read Article →Learn how to use the Microsoft Graph Developer Proxy to find minimum permissions for your Microsoft Graph PowerShell scripts. The post Identify min...
Read Article →The Microsoft FY24 Q4 results delivered solid growth in Microsoft Cloud revenues. No new numbers were given for Office 365 or Teams users, possibly...
Read Article →OAuth apps are still an important target for attackers to misuse in organizations. Since the MFA baseline is improved with number matching and addi...
Read Article →In this article, I would like to point out options to identify, monitor and avoid persistent access on Managed Identities privileges by adding fede...
Read Article →The first update for Office 365 for IT Pros (2025 edition) or monthly update #110 is now available for subscribers to download. The update covers b...
Read Article →This is the fourth and, for now, last blog post in the Windows Enrollment Attestation series. In it, I will explain how the three previous blogs le...
Read Article →Learn how to use the Get-MgUser cmdlet in Microsoft Graph PowerShell to return the ID and Sign-in information for deleted users. The post Return a ...
Read Article →Teams ACM replaces app permission policies with an easier method of defining who can use Teams apps. A wizard in the Teams admin center runs a one-...
Read Article →Microsoft plans to archive unlicensed OneDrive sites starting in January 2025. The obsolete sites will end up in Microsoft 365 archive, from where ...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →The task to find manager for Entra ID accounts seems simple until you find the bunch of utility accounts created by Exchange Online that should be ...
Read Article →Use Microsoft Graph PowerShell to export a list of all permissions assigned to all application in Microsoft Entra. The post Find all permissions as...
Read Article →Microsoft Defender for Endpoint and Network Monitoring In November 2022, Microsoft announced they integrated the Zeek open-source network traffic a...
Read Article →Learn how to use PowerShell to find if the Settings Catalog in Intune contains settings by the custom OMA-URI path. The post How to find settings i...
Read Article →Great news! The July Preview KB5040527 update has finally fixed the Windows subscription activation issue that plagued the upgrade from Windows 11 ...
Read Article →All software has unique quirks, and the foibles of the Microsoft Graph PowerShell SDK are well known. But it’s much harder when the underlying foun...
Read Article →On the surface, the work to delete OneDrive for Business accounts seems straightforward because Microsoft provides a 30-day deletion period to revi...
Read Article →This is the third blog in the Windows Enrollment Attestation / MDM Hardening series. In it, I will examine what happens when we combine the amazing...
Read Article →In a change designed to reduce the consumption of storage quota, Stream video versions are no longer being generated for non-video updates such as ...
Read Article →The Microsoft 365 licensing report now supports a cost center analysis based on cost center values stored in an Exchange custom attribute. The new ...
Read Article →Every Microsoft 365 tenant must deal with ex-employee mailboxes. The default choice is to make the mailboxes into shared mailboxes. But inactive ma...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Learn how to rotate BitLocker keys for devices managed with Microsoft Intune using Microsoft Graph PowerShell. The post How to rotate BitLocker key...
Read Article →Microsoft will soon start blocking the use of custom OMA-URI settings in Microsoft Intune for settings that existing in the settings catalogue. The...
Read Article →From X/Twitter. Thx to @r3srch3r for summarization. Physical machine physical server VM on Hyper-V VM on AWS VM on Azure ... Read more
Read Article →I dislike the Microsoft 365 self-service purchase mechanism and disable it in any tenant where I can. Global and Billing administrators for tenants...
Read Article →This blog will be the second one in the Windows Enrollment Attestation Series!! And let me promise you one thing!!! The words rabbit hole will get ...
Read Article →On July 17, Microsoft announced the public preview of inbound SMTP DANE with DNSSEC for Exchange Online, a welcome step forward to improve messagin...
Read Article →Last Updated on September 29, 2024 by Michael Morten Sonne Introduction In today’s fast-paced digital world, ensuring the… The post Sig...
Read Article →Learn how to delete Microsoft Cloud PKIs in Microsoft Intune using the portal and Microsoft Graph PowerShell. The post How to delete Cloud PKI CAs ...
Read Article →This blog will be the first one in the Windows Enrollment Attestation / MDM Hardening series. In it, I will take a closer look at a beautiful funct...
Read Article →In what seems to be a small change, team owners can rename general channels (naturally with 'meaningful names.' The change is more important than i...
Read Article →A reader wanted to know why the Purview Compliance portal doesn't show who last updated sensitivity label policies. The reason why is unclear, but ...
Read Article →Welcome to our Windows Enrollment Attestation series overview. This feature is also known as MDM Hardening and MDM Device Attestation. In this blog...
Read Article →Last Updated on January 21, 2025 by Michael Morten Sonne Introduction If you’re encountering this error message in… The post Azure Arc ...
Read Article →The Teams and Groups activity report is a popular script that helps administrators identify inactive teams and groups within a Microsoft 365 tenant...
Read Article →Last Updated on December 18, 2024 by Michael Morten Sonne Introduction Yes – now its announce that the… The post Entra ID – Global Secu...
Read Article →A new status filter named 'Staged rollout' has appeared in the Conditional Access portal of Microsoft Entra recently, so what is it? The post Condi...
Read Article →It's common to be asked which is the best mobile email client for Exchange Online. My view is that Outlook Mobile is the only client to use (if pos...
Read Article →Microsoft says they will remove the Remove-SPOExternalUser cmdlet starting July 29. They recommend using Remove-AzureADUser as a replacement. It's ...
Read Article →Last Updated on July 10, 2024 by Michael Morten Sonne Intoduction I’m thrilled to announce the latest release… The post Introducing Azu...
Read Article →In June, Microsoft retired Office Connectors for SharePoint Online and Microsoft 365 Groups. Starting on August 15, they're retiring connectors for...
Read Article →A cloud policy setting enables a delay for evaluating message content and allows Outlook DLP Policy Tips to be displayed after detection of a polic...
Read Article →Enrolling devices into Windows Autopilot Device Preparation should be straightforward, but sometimes, unexpected issues require a deeper dive into ...
Read Article →Around 5 years ago, Microsoft announced the general availability of Azure Sentinel. This post aims to assess how far we along we have come - the go...
Read Article →Graph databases offer great insights into existing data, that relational databases cannot or can only solve with more resources. Tools that leverag...
Read Article →Learn how to use Extension Attributes in Microsoft Entra to filter users based on the extension property using Microsoft Graph. The post How to fil...
Read Article →A new Outlook Mobile synchronization setting allows users to select a window of between 1 and 90 days to download copies of email and attachments. ...
Read Article →Last Updated on September 24, 2024 by Michael Morten Sonne Intoduction As we cross the midpoint of 2024,… The post Reflecting on a remarkable...
Read Article →In a welcome update, the Teams development group have provided a new policy setting to control the display of some in-product messages in Teams cli...
Read Article →A very useful update to support sharing links expiration for all link types used by SharePoint Online and OneDrive for Business is now rolling out ...
Read Article →In this blog, I will examine a funny 0x8007010B error that Endpoint Privilege Management (EPM) could give you when you try to elevate the CMD using...
Read Article →From mid-July 2024, Teams will begin hiding inactive channels for users. The inactive channels can be unhidden, and users can opt out of the automa...
Read Article →Check out this article via web browser: Temporary exclusions for Conditional Access using PIM for Groups Conditional Access include and exclude gro...
Read Article →Find out about the new Microsoft Entra Suite licensing which includes step-up features from the Microsoft 365 E5 license, including verified ID, ID...
Read Article →Check out this article via web browser: Prevent Conditional Access bypass with Restricted Management Administrative Units in Entra ID Bypassing Con...
Read Article →Some folks wonder why they can't use documents shared with them using company-wide links with Copilot for Microsoft 365. As it turns out, the answe...
Read Article →Office 365 for IT Pros 2025 edition, the 11th edition of the most comprehensive and in-depth book covering the Microsoft 365 Office servers, is now...
Read Article →Last Updated on September 24, 2024 by Michael Morten Sonne Intoduction This blog post is about an issue… The post Veeam Backup M365 – Exchang...
Read Article →The old Files tab in Teams chat is being replaced by the Shared tab. The new tab exposes both files and hyperlinks and Microsoft says that the Shar...
Read Article →Learn how to assess how the impact of MFA enforcement on Azure service will impact your users. The post How to assess the impact of MFA enforcement...
Read Article →Microsoft is moving to block federated communications with trial Microsoft 365 tenants to cut off a potential exploitation route for attackers. The...
Read Article →With all the new features added to Microsoft Endpoint Privilege Management (EPM), we must not forget another new and long-awaited feature. This blo...
Read Article →Introduction In April 2024, MITRE came with their new V15 version of ATT&CK. In this version a new sub-technique was introduced called ‘T...
Read Article →The Outlook settings API is a unfinished Graph API that can read and update some but not all mailbox settings. It's a pity that the API is incomple...
Read Article →V1.2 of the User Passwords and MFA report includes the names of authentication methods registered for user accounts. V1.3 expands the amount of det...
Read Article →Microsoft have announced that the Microsoft Graph Command Line Tools application will soon become a verified application. The post Microsoft Graph ...
Read Article →Learn how to find which applications in Microsoft Entra have specific permissions assigned using Microsoft Graph PowerShell. The post How to find s...
Read Article →Microsoft has announced the formal renaming of the Win32 version of Outlook to be Outlook (classic). It's preparing for the general availability of...
Read Article →Introduction In the past, I was always curious about the workings of Connect-AzAccount, the authentication command from the Az.Accounts PowerShell ...
Read Article →The Set-PlannerUserPolicy cmdlet allows Microsoft 365 tenant administrators stop users deleting tasks created by other users. However, an undocumen...
Read Article →This blog will focus on the importance of the Enrollment Time Group (JustIntTimeConfiguration), which is currently only used with Autopilot Device ...
Read Article →Microsoft Copilot for Security is a new tool based on AI, it takes signals from various sources to use the data as additional input and research la...
Read Article →Some tips, tricks and tools to help you get started testing your own infrastructure. This is the start, where I'll just lay out some basic principl...
Read Article →The Microsoft 365 Licensing Report is a popular PowerShell script that's just been updated to V1.9 with a bunch of changes to highlight different a...
Read Article →Microsoft Defender for Cloud Apps is one of the many puzzle pieces of the Microsoft XDR solution that helps you to secure your corporate environmen...
Read Article →Microsoft Intune will soon require a higher version of MacOS and iOS later this year. Learn how to identify the impact in your tenant. The post Mic...
Read Article →Microsoft wants users to upgrade from legacy Outlook clients. The biggest impact for Microsoft 365 tenants might be the loss of OWA light, but cons...
Read Article →The Set-MailboxFolderPermission cmdlet is usually used to set calendar permissions, including the permission for the default user to allow everyone...
Read Article →The incoming webhook connector is a popular method to post information to Teams channels, but Microsoft seems set on retiring the Office connectors...
Read Article →Learn how to use Microsoft Graph PowerShell to disable per-user MFA in Microsoft Entra to support migration to Conditional Access. The post How to ...
Read Article →A Microsoft Graph update makes per-user MFA state available for user accounts. Being able to access the data means that we can include it in the Us...
Read Article →Our review of the Videos chapter for the Office 365 for IT Pros eBook found a Teams meeting policy setting we hadn't documented to block downloads ...
Read Article →In this blog, I’ll explain how we resolved an issue where saving the new Autopilot device preparation profile failed to save the device group...
Read Article →Learn how to use Microsoft Graph PowerShell to view the per-user MFA state and method for users in Microsoft Entra. The post Report per-user MFA st...
Read Article →Splatting is an optional PowerShell technique designed to make it easier to pass parameter values for cmdlets. It’s a personal choice whether to us...
Read Article →If you need to get an Azure Monitor alert using Azure Resource Graph data, this can easily be accomplished using ... Read more
Read Article →Learn how to configure device clean-up rules at a platform level in Microsoft Intune to target Windows, IOS, Android, Mac or Linux devices. The pos...
Read Article →In this blog, I will discuss how I found out a specific entra setting was interfering, AKA breaking my Windows Autopilot device preparation deploym...
Read Article →Office 365 Connectors bring data from external sources into Microsoft 365 apps like Teams and Outlook. Workflows and Power Automate are replacing C...
Read Article →Understanding SharePoint Online storage used to be easy. Then applications like Loop arrived. Other influences like retention and archive can affec...
Read Article →Three years ago, I wrote a script to analyze the audit records generated for Teams meeting recordings. Then things changed in terms of how the audi...
Read Article →This article describes how to use the Microsoft Graph PowerShell SDK to report delegated permission assignments to user accounts and apps. Like in ...
Read Article →In this blog, I will explore the wonders of Autopilot Device Preparation (AP-DP), from the first step of signing in to the last step in the Autopil...
Read Article →Deciding whether to use Microsoft Graph PowerShell SDK cmdlets or Graph API requests is sometimes not easy. Some say that it's best to use Graph AP...
Read Article →Last Updated on June 5, 2024 by Michael Morten Sonne Intoduction Finally, with the Global Secure Access traffic… The post Entra ID – Global S...
Read Article →Learn how to deploy Device Preparation Policies in Microsoft Intune programmatically using Microsoft Graph PowerShell. The post How to deploy Autop...
Read Article →Learn about the different types of security tokens in Microsoft Entra and the Primary Refresh Token in the sign-in logs. The post Understanding Pri...
Read Article →I spoke together with my colleague Thijs Lecomte at Experts Live, where we talked about how we architecture a Security Operations Center on top of ...
Read Article →The latest technology initiative from Microsoft comes in the form of Teams custom emojis, designed to bring light and happiness to Microsoft 365 te...
Read Article →Without any fuss or bother, Microsoft announced that the Teams 2.1 client has regained the Notify When Available feature. This functionality allows...
Read Article →In this blog, I’ll dive into a key difference between traditional Autopilot and Autopilot Device Preparation (APv2). I’ll explain why the har...
Read Article →This blog covers a custom script solution for Intune, that can be used to automatically detect, if the Entra Private ... Read more
Read Article →The June 2024 update for the Office 365 for IT Pros 2024 edition ebook is available for download. We're also announcing the availability of the 202...
Read Article →Copilot audit records generated for the Microsoft 365 audit log capture details of the resources (files, emails, and documents) used by Copilot in ...
Read Article →Microsoft is deploying additional audit events to tenants with Purview Audit (Standard) licenses. Among the 15 Teams events in the set are Teams me...
Read Article →Learn how to use Microsoft Graph PowerShell to filter, find and manage the sign-in logs for Microsoft Entra. The post How to Manage Microsoft Entra...
Read Article →The Teams Activity feed received two recent major changes. First, calendar notifications now show up in the feed. Second, the set of filters that w...
Read Article →A request came in for a PowerShell script to report mailbox audit configurations to check that the important new events are being generated by mail...
Read Article →Check out this article via web browser: Entra ID Dynamic Groups – Direct reports of a manager Here’s a quick tip that I discovered only...
Read Article →Microsoft is changing the storage location for Teams Meeting Transcripts from Exchange Online to OneDrive for Business. The change is designed to s...
Read Article →Enterprise Application Management has announced Guided application upgrades later this year in Microsoft Intune. The post Guided application upgrad...
Read Article →Last Updated on June 29, 2024 by Michael Morten Sonne Intoduction I’m thrilled to announce the latest release… The post Introducing a n...
Read Article →The Stream browser client has received some nice new features including the ability to trim videos in a very efficient manner and to add callouts t...
Read Article →A May 20 post contains the welcome news that the new audit events promised for Purview Audit standard customers should be available in June 2024. S...
Read Article →Are you anxiously waiting for the Autopilot V2 Announcement? APv2 has just been officially announced and has a nice new shiny name: Autopilot Devic...
Read Article →Microsoft are to release new granular security permissions relating to security baselines in Microsoft Intune. The post New granular security polic...
Read Article →Welcome to the Config Refresh Blog! Today, I’ll be diving into the fascinating world of Config Refresh. Specifically, we’ll explore how...
Read Article →A new feature for Teams recurring meetings allows meeting organizers to create Loop workspaces to hold content shared within the meetings. It's an ...
Read Article →On April 9, 2024, Microsoft announced a big change in authentication for Outlook add-ins. It's likely that people don't realize the kind of change ...
Read Article →The Financial Times reported that the EU is lining up new charges against Microsoft for Teams anti-competitive behavior. Given that Microsoft has a...
Read Article →On May 14, Microsoft announced that they will require Azure MFA for connections to services starting in July 2024. No details about the implementat...
Read Article →Teams has added the ability to use slash commands (shortcuts) to the message compose box. Although the feature seems useful, I wonder about its pot...
Read Article →A recent SharePoint Onlne update enables folder deletion when items are present in a folder. This is probably the way that things should have alway...
Read Article →Setup Cisco Duo as an External Authentication Method in Microsoft Entra ID and satisfy MFA requirements in Conditional Access. The post Configure E...
Read Article →The Follow response is a new option for people invited to a meeting to indicate that they can't attend but are interested in what happens. Replying...
Read Article →This article describes the process of blocking device code authentication requests against Entra ID with a preview feature for conditional access p...
Read Article →April 1, 2024, seen the release of Microsoft Copilot for Security to general availability (GA). It is a generative AI solution integrating with Def...
Read Article →Last Updated on May 10, 2024 by Michael Morten Sonne Introduction Let´s explore some of the new in… The post Entra ID – Exploring the new fea...
Read Article →Team channel collaboration might be a better choice than always creating a new team to host discussions about a topic, especially if channels grow ...
Read Article →The user authorization policy defines user role permissions, or actions that non-admin users can take within an Entra ID tenant. The default settin...
Read Article →In a May 2 announcement, Microsoft said that they have signed up 9 ISVs to add support for Entra ID authentication methods. The third-party methods...
Read Article →Are you dealing with Hybrid joined, Intune enrolled devices and wondering why the EPM agent isn’t showing up on your device after activating ...
Read Article →The Teams iOS client can send one-minute Teams video messages (or clips) to chats or channels conversations. Now, the videos can use image or blur ...
Read Article →Some problems emerged in V2.17 and V2.18 of the Microsoft Graph PowerShell SDK. In one case, Microsoft changed cmdlet names. In another, it's an id...
Read Article →Are you experiencing problems with the automatic upgrade from Windows 11 Pro to Windows 11 Enterprise during Autopilot on the latest Windows build?...
Read Article →On May 2, 2024, Microsoft announced the retirement of the Stream Mobile app on July 1, 2024. It's all to do with rationalization and focus, or so M...
Read Article →Learn about External Authentication Methods in Microsoft Entra and how to setup new External Authentication methods for Entra ID. The post Setup Ex...
Read Article →Last Updated on May 2, 2024 by Michael Morten Sonne Intoduction Resetting Microsoft Defender for Cloud Configuration Are… The post Defender f...
Read Article →The Share to Teams Outlook add-in posts an email to a Teams chat or channel conversation. I was asked how to disable the add-in for some mailboxes....
Read Article →Another month, another update for the Office 365 for IT Pros eBook. In this case, it's monthly update #107 for Office 365 for IT Pros (2024 edition...
Read Article →Use Microsoft Graph PowerShell to report which Autopilot profile is assigned to each device in Microsoft Intune. The post Report assigned Autopilot...
Read Article →The Copilot for Microsoft 365 license has 8 service plans to govern feature availability. You can disable individual components, if you know what y...
Read Article →Learn how to use Microsoft Graph PowerShell and filtering to find all license-enabled groups in Microsoft Entra. The post Find all license-enabled ...
Read Article →The Teams classic client has been replaced by the Teams 2.1 client. Microsoft will block access to the Teams classic client for people running the ...
Read Article →Introduction Defender for Identity is a very important sensor to detect threats in an Active Directory environment. Therefore, it is important to m...
Read Article →You can now create client secret during app registration in Microsoft Entra using Microsoft Graph PowerShell. The post Create client secrets during...
Read Article →The Microsoft FY24 Q3 results didn't contain any new user numbers for Office 365 or Teams. However, we did learn that Copilot and Azure are popular...
Read Article →Learn how to generate and export a Defender For Endpoint agent status report using Microsoft Graph PowerShell. The post Defender for Endpoint statu...
Read Article →Teams group chats are getting a new Meet Now experience. Is that good news? Well, it's not an earthshattering change, but it is a nice change becau...
Read Article →This blog is about an issue, I experienced when I was invited as Guest to a tenant, where cross-tenant access ... Read more
Read Article →A reader asked if it is possible to script sending chat messages. In this article, we explore how to compose and send Teams urgent messages to a se...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Learn how to auto-update applications using supersedence in Microsoft Intune for apps assigned as available. The post How to auto-update apps assig...
Read Article →Some years ago, I wrote a script to demonstrate how to remove service plans with PowerShell. This article describes some upgrades to make the scrip...
Read Article →This blog will show you something you need to be aware of when you purchase the Intune Suite and use the Cisco DUO desktop app. When activating the...
Read Article →The M365 Conference takes place in Orlando, FL from April 28 to May 2, 2024. I have two sessions, but my attempts to find sessions that cover all o...
Read Article →Microsoft fix a bypass technique where you can register personal Windows devices in Intune even while they are blocked. The post Microsoft Fix Intu...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →License management is a core competence for Microsoft 365 tenant administrators. This article explains how to use PowerShell to remove licenses fro...
Read Article →April 11 saw the general availability of Microsoft Graph activity logs, a new set of data recording details of Graph API HTTP requests made in a te...
Read Article →Although the trend is toward password authentication, many Microsoft 365 tenants still use passwords and some force users to change passwords regul...
Read Article →How to add a managed identity to Azure DevOps and get access tokens for Azure Devops - This one is very short and sweet - how to authenticate to Az...
Read Article →Everything you need to know to download Azure DevOps repositories using a Managed Identity and REST API - In this post, we will go over how to down...
Read Article →Exchange Online announced two important changes on April 15. SMTP AUTH is being depreciated and a new external recipient rate limit is being introd...
Read Article →Use Microsoft Graph PowerShell to create a report of all Passkeys and their AADGUIDs current in use in your Tenant. The post List All Passkeys and ...
Read Article →The Maester tool is a community initiative to create a tool to help tenant administrators improve the security of their Entra ID tenants. It’s stil...
Read Article →Learn how to prepare your email environment for the permanent retirement of SMTP auth in Exchange online by September 2025. The post Prepare for Ex...
Read Article →Introduction During the last few years, I worked with a couple of customers who struggle with getting control over their corporate networks. Even t...
Read Article →Check out this article via web browser: Get started with passkeys in Microsoft 365 It’s here! A long-awaited feature in Microsoft 365 is fina...
Read Article →Last Updated on July 10, 2024 by Michael Morten Sonne Intoduction I’m thrilled to announce the latest release… The post Introducing Azu...
Read Article →With the release of the public preview for Passkey in Entra ID, I think, the broad adoption of passwordless and phishing resistant authentication a...
Read Article →Microsoft Teams now boasts the ability to add customizable group chat pictures to what might be otherwise a set of chats with not-very-good generat...
Read Article →Configure an automation Microsoft 365 Security Poster Monitoring solution using the Maester tool using Azure Automation. The post Automated Microso...
Read Article →Learn how to enable Passkeys in the Microsoft Authenticator app for FIDO2 compliance authentication to Microsoft Entra. The post How to enable Pass...
Read Article →Monarch client security became an issue last year when a German website reported some issues. It turns out that the reported problems are mostly hy...
Read Article →This small blog will examine how the Program entity in the Intune suite feature Device Query is a work in progress. I will update this blog every t...
Read Article →A recent note from Microsoft advised that if your tenant uses classic Azure administrative role, you need to switch to Azure RBAC roles by 31 Augus...
Read Article →A new parameter for the Set-CsTenantFederationConfiguration cmdlet made me look at the Teams tenant federation configuration again to improve how a...
Read Article →A previous attempt to write a script to report all Loop workspaces in a tenant was flawed because it only retrieved the first 200 workspaces. I had...
Read Article →Did Microsoft fix the Config Refresh bug with the March update? However, that doesn’t mean it also works. In this blog, I will examine how Config R...
Read Article →Learn how to configure Certificate-based authentication in Microsoft Entra using certificates issues from your Intune Cloud PKI. The post Use Certi...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →According to Microsoft 365 notification MC736438, Microsoft is getting tougher at enforcing the rules for Purview information protection licenses. ...
Read Article →Background Some of my customers are not having 24×7 SOC but still wants to utilize Microsoft Security Copilot during their ... Read more
Read Article →Last Updated on April 4, 2024 by Michael Morten Sonne Intoduction What is comming to the Microsoft Defender… The post Microsoft Defender XDR ...
Read Article →A new major version of the MsCommerce PowerShell module makes you hope that something good is included in the new code. In this case, it’s hard to ...
Read Article →Last Updated on April 3, 2024 by Michael Morten Sonne Intoduction Now you can strengthening your defense against… The post Defender for Offic...
Read Article →Learn how to configure High Volume Email in Microsoft 365 to increase the Exchange Online messaging limits for your applications. The post Enable H...
Read Article →The unified audit log includes Copilot for Microsoft 365 audit events captured when users interact with Copilot through apps. The information is ve...
Read Article →This blog will supplement my previous one, in which I explored the new DMClient LinkedEnrollment DiscoveryEndpoint Node. I will guide you through t...
Read Article →Microsoft announced a new component for OWA distribution list management but clearly the engineers never took role assignment policy customizations...
Read Article →Dive into LAPS for Windows: a game-changer in admin account security. Discovery of the new CSP settings and configurations.
Read Article →The April 2024 update for the Office 365 for IT Pros eBook is now available for subscribers to download from Gumroad.com or Amazon.com. Like every ...
Read Article →In this blog, I will examine the same things as Niehaus but this time the next-generation Intune, MMP-C. I will also examine the sync scheme and sh...
Read Article →Use the Organizational Branding Administrator role to update your organisations branding in Microsoft Entra. The post Update Branding With the Orga...
Read Article →Last Updated on June 29, 2024 by Michael Morten Sonne Intoduction I’m thrilled to announce the latest release… The post Introducing Git...
Read Article →Prevent the global administrators in Microsoft Entra from being added to the local administrators group on Microsoft Entra joined devices. The post...
Read Article →In this blog, I will examine the new Entra local administrator settings, which prevent users from becoming local administrators on their devices du...
Read Article →On March 27, SharePoint history reached its 23rd year. That's a great achievement and SharePoint Online powers many apps. But dark clouds are on th...
Read Article →I had a great time hanging out and talking about a little bit of everything with some of the Trimarc folks. Thanks to Brandon for inviting me on! :)
Read Article →Every Microsoft 365 tenant has a tenant identifier, a unique GUID that's used within the Entra ecosystem to identify a tenant and its objects. Much...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →In this blog, I will dive deep into the Endpoint Privilege Management feature “Support Approved” once more. I will show you how Support Approved wo...
Read Article →After the welcome announcement that the Loop app will support external access, thoughts might turn to figuring out who uses the app. Fortunately, i...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →A new preview feature supports high completeness audit log searches. These searches are optimized to make sure that they find every matching audit ...
Read Article →Message center notification MC734281 explains that Copilot for Microsoft 365 will get better grounding for Word, Excel, PowerPoint, and OneNote fro...
Read Article →Critical features will break or stop working, if you delete too much in Legacy solutions like SecurityInsights, SQLAdvancedThreatProtection or SQLV...
Read Article →Last Updated on March 23, 2024 by Michael Morten Sonne Intoduction Are you tired of spending valuable time… The post Azure – Automating Manag...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →The Microsoft 365 Groups and Teams Activity Report is a PowerShell script that I've worked on since 2016 (not all the time). Some recent Graph hicc...
Read Article →A new convert to internal user preview feature allows Entra ID administrators to convert external accounts to internal accounts. An option is avail...
Read Article →The Windows Registry serves as a repository for critical system configurations and preferences, essential for the smooth operation of the Windows O...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Microsoft 365 Backup costs are charged on a PAYG basis against an Azure subscription. You pay a flat fee of $0.15 per month per gigabyte of protect...
Read Article →Microsoft's support for SharePoint Online PowerShell has degraded over the last few years. Pnp.PowerShell is now the best option as not much is hap...
Read Article →Check out this article via web browser: How to simulate risk in Microsoft Entra ID Protection Entra ID protection is an excellent feature amongst t...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →An article by security researchers Black Hills pointed to some vulnerabilities with incoming webhook connectors and email connections for Teams cha...
Read Article →Learn how to converted guests to internal using in Microsoft Entra using the web portal or Microsoft Graph PowerShell. The post Convert External Us...
Read Article →Use these 3 methods to find the tenant ID of any Microsoft Entra tenant without access to the tenant. The post How to a Find Microsoft 365 Tenant I...
Read Article →Last Updated on June 29, 2024 by Michael Morten Sonne Intoduction I’m thrilled to announce the latest release… The post Introducing Git...
Read Article →The Loop app is a powerful collaborative platform that has been handicapped up to now with a restriction on its External Sharing capabilities. That...
Read Article →This article describes how to use sign-in data to identify unused Entra ID registered devices. It’s an imperfect solution because Entra ID doesn’t ...
Read Article →Last Updated on July 27, 2024 by Michael Morten Sonne Intoduction The Microsoft 365 Developer Program is an… The post Microsoft 365 Developer...
Read Article →This article describes the experience of creating a custom quarantine message for Exchange Online Protection to send to those with email held in qu...
Read Article →An interesting LinkedIn post by a Microsoft employees relates how Copilot for Microsoft 365 saves him 14 hours monthly. Reports like this must be t...
Read Article →On March 7, Microsoft published a timeline for the New Outlook for Windows client that says that support for the classic client will be until at le...
Read Article →A recent article by a Microsoft MVP attempted to lay out a case that tenants should not use Microsoft 365 PowerShell and use ISV products instead. ...
Read Article →This blog will be an additional blog to the TPM attestation series I wrote some time ago. In this one, I am going to take a closer look at why [...
Read Article →Learn how to setup RADIUS wireless network authentication in a completely cloud environment using Microsoft Entra, Cloud PKI and RADIUSaaS. The pos...
Read Article →Restricted SharePoint Search is an answer for customers who don't like the idea of Copilot for Microsoft 365 being able to find documents in any si...
Read Article →Last Updated on March 23, 2024 by Michael Morten Sonne Intoduction In an era defined by the dynamic… The post Entra ID – Global Secure Access...
Read Article →Last Updated on March 6, 2024 by Michael Morten Sonne Intoduction Microsoft have in collaboration with partners and… The post Secure Boot – W...
Read Article →The use of Information Protection sublabels is one of the questions for teams implementing sensitivity labels in Microsoft 365 tenants. Some like t...
Read Article →Intro I noticed that more and more clients are starting to use mixed license model for Defender for Servers. Previous you could only enable Defende...
Read Article →Did you ever run into an issue in which the user was still in the local administrator group after the device was enrolled with Windows Autopilot (a...
Read Article →If you are using Entra Private Access (or other SSE solutions) – together with Windows Hello for Business Kerberos Trust, ... Read more
Read Article →Last Updated on June 29, 2024 by Michael Morten Sonne Introduction The GitHub Backup Tool provides an intuitive… The post GitHub – Get a loca...
Read Article →This blog will investigate what happens under the hood when our device is enrolled with Windows Autopilot during the “preparing your device f...
Read Article →An update allows Teams owners to archive Teams channels. This is an excellent way of keeping old channels online while removing them from open view...
Read Article →Microsoft has released the View Another Mailbox feature for the new EAC. This is part of the build-out of the new EAC functionality before the reti...
Read Article →The Office 365 for IT Pros eBook team has released the March 2024 update for the only eBook covering the Microsoft 365 ecosystem that's updated mon...
Read Article →Introduction In a previous blog post I talked about how adversaries can exploit SSO capabilities of Hybrid or fully Entra ID joined devices. I ment...
Read Article →Last Updated on March 15, 2024 by Michael Morten Sonne Intoduction 🎉 I am so thrilled to share… The post Honored to receive the Microsoft MVP...
Read Article →Microsoft has created an easy to use Microsoft 365 Backup solution. Its key feature is speed, including speed to restore data. I tested restores fo...
Read Article →A Microsoft Technical Community article gave some interesting information about how to report soft-deleted Entra ID objects. We think we can improv...
Read Article →This blog will explain everything you want to know about this new ESP function called “Only fail selected blocking apps in technician phase (preview).
Read Article →Learn how to configure you own Certificate Authority in Microsoft Intune Step by Step using Cloud PKI feature of Intune Suite. The post How to Setu...
Read Article →Device Code Flow is a great feature. You are signed in on a machine that does not have any UI but need to connect to an Azure or Microsoft 365 reso...
Read Article →If you wanted to write a PowerShell script to create a OneDrive storage report, you'd probably use the cmdlets from the SharePoint Online managemen...
Read Article →Today (Tuesday February 27th) I have the pleasure to speak at the February 2024 Azure APE Meetup organized by the Azure Platform Engineering (APE) ...
Read Article →Microsoft has released the preview of the Entra ID usage insights for premium license consumption. This could be the harbinger of a more restricted...
Read Article →Last Updated on February 25, 2024 by Michael Morten Sonne Intoduction Let’s delve into what makes this script… The post PowerShell – Co...
Read Article →Last Updated on February 24, 2024 by Michael Morten Sonne Intoduction Introducing the Updated Advanced Settings Page for… The post Microsoft ...
Read Article →Learn how to protect the device code authorisation flow in Microsoft Entra using Conditional Access policies. The post Protect the Device Code Auth...
Read Article →The Viva Topics retirement announced on February 22, 2024 is an inevitable side-effect of Microsoft's ongoing focus on Copilot. It is difficult to ...
Read Article →In this updated blog, I will take a closer look at what exactly happens when you press the “Check Access” button in the Company Portal and why it t...
Read Article →Teams Tags Support for Private and Shared Channels should arrive in targeted tenants soon. The new tag capability uses channel memberships instead ...
Read Article →Last Updated on February 22, 2024 by Michael Morten Sonne Intoduction In an era defined by the dynamic… The post Entra ID – Global Secure Acc...
Read Article →Check out this article via web browser: Microsoft 365 end-user notifications for changes in authentication methods When moving away from traditiona...
Read Article →Learn how to report on Microsoft Entra Premium license utilisation using Microsoft Graph PowerShell to identify utilisation metrics. The post Repor...
Read Article →Two methods exist to exclude a SharePoint sites from Copilot being able to use its contents - you can exclude the site (or document library) from s...
Read Article →This blog will show you how the new Automatic Account Management feature in Windows LAPS, in combination with another new “hidden defunctR...
Read Article →Microsoft announced last year a new feature with the name; Automatic Attack Disruption in Defender XDR (Microsoft 365 Defender). Since October last...
Read Article →Usually, we recommend that Microsoft 365 tenants use the latest version of the Microsoft Graph PowerShell SDK. However, a serious bug in V2.14 mean...
Read Article →Last Updated on February 21, 2024 by Michael Morten Sonne Intoduction In a proactive move to give us… The post Microsoft Defender XDR – Offbo...
Read Article →A longstanding problem (SP676147) open since September 2023 causes problems retrieving important SharePoint usage data like site URLs and user acti...
Read Article →Last Updated on February 21, 2024 by Michael Morten Sonne Intoduction In an dynamic nature of work, where… The post Entra ID – Global Secure ...
Read Article →Last Updated on February 17, 2024 by Michael Morten Sonne Intoduction Unlocking Digital Time Capsules In a noteworthy… The post Microsoft mak...
Read Article →The Office 365 for IT Pros team welcomes Michel de Rooij as a new author. As a PowerShell Pro, he'll like the code to update the impersonation prot...
Read Article →Finally, it’s time for a refresh. It’s been a while! Due to personal circumstances, I haven’t been able to keep the U...
Read Article →Microsoft originally said that Copilot for Microsoft would only support the Monarch client. Now it turns out the Outlook Win32 Copilot support is c...
Read Article →Explore storing Microsoft Entra logs via Azure Monitor, Storage Accounts, and Event Hubs, each offering unique benefits for IT security.
Read Article →Learn how to Migrate Identity Protection Risk policies in Microsoft Entra to Conditional Access Policies before they are retired. The post Migrate ...
Read Article →The latest version of the Microsoft 365 Licensing Report script includes code to generate cost analyses for the departments and countries assigned ...
Read Article →If your Microsoft 365 tenant has Entra P2 licenses, you can use the Entra Identity Secure Score feature to measure your tenant against Microsoft be...
Read Article →Learn about the Teams Telephony Admin Role in the Teams Admin Center which is specifically designed to managed telephony-related functions in teams...
Read Article →Learn about the High Volume Email service in Microsoft 365's Exchange Online platform so send bulk emails to external recipients. The post Send Hig...
Read Article →Last Updated on February 15, 2024 by Michael Morten Sonne Intoduction Why set this up? Configuring email authentication… The post Configure e...
Read Article →Check out this article via web browser: Viewing changes to Conditional Access policies just became easier! Today, a quick tip for all Entra admins ...
Read Article →If conditional access policies impose MFA for all cloud apps, it gives external users a problem when they use Outlook desktop to read protected ema...
Read Article →This article describes how to use the Microsoft Graph PowerShell SDK to retrieve and interpret Microsoft 365 message center posts with the intentio...
Read Article →This blog introduces a new Intune feature: ConfigRefresh, also known as Config Refresh, designed to enhance device security without the need for re...
Read Article →Message center notification MC711019 covers the ability to hide the General channel for a team, a feature designed to free up space in the teams an...
Read Article →Signals from across Microsoft’s services and ecosystems inform Entra ID Protection to detect risk. The risk detections can alert administrato...
Read Article →How to quickly list all applications in the Microsoft Intune Enterprise App Catalog using Microsoft Graph PowerShell. The post List All Available A...
Read Article →The Microsoft Graph includes the Service Communications API. SDK cmdlets can use the API to retrieve and work with service health data. In this art...
Read Article →Last Updated on April 27, 2024 by Michael Morten Sonne Intoduction In the ever-evolving landscape of cloud-based infrastructures,… The post D...
Read Article →Learn how to register new applications in Microsoft Entra and assign permissions using Microsoft Graph PowerShell. The post Register New Applicatio...
Read Article →This article explains how to check Managed Identity permissions, or rather the set of consented Graph and other permissions held by the service pri...
Read Article →The latest version of the MSIndentityTools PowerShell module includes the Export-MsIdAppConsentGrantReport cmdlet to generate a report of OAuth app...
Read Article →Since a few weeks I recognized an uptick in Entra ID Protection alerts regarding “Anonymous IP address” detections. Normally this is a ...
Read Article →Check out this article via web browser: A Thread on Frosty Fiascos: Delving into the Microsoft Midnight Blizzard Hack This post is all about the ha...
Read Article →This blog will show you why the new Device Query Intune Suite feature could give you the wrong information when you are using the WindowsRegistry e...
Read Article →Microsoft Defender Vulnerability Management (MDVM) is an often overlooked service that can be licensed standalone or is included in other Microsoft...
Read Article →In this blog, I am going to take a closer look at how we can troubleshoot a new feature in Intune called Device Query, also known as Intune Pivot. ...
Read Article →A question asked if it's possible to hide individual distribution list members. It's easy to hide the complete membership but not as simple to hide...
Read Article →Introduction You are probably wondering, what has CSS to do with detecting AitM sites. In this blog post, we will go over how we can use a custom C...
Read Article →This blog will show you how Microsoft is stepping up the real-time reporting game by introducing a new wonderful feature called: Intune Pivot Devic...
Read Article →Learn how to deploy applications from the Enterprise App Catalog in Microsoft Intune using the web portal and PowerShell. The post How to Deploy Ap...
Read Article →The February 2024 update for the Office 365 for IT Pros eBook (monthly update #104) is now available for download. Lots happened during January in ...
Read Article →Office 365 Reaches 400 million. Well, to be precise, in their FY24 Q2 results, Microsoft said that the figure is "over 400 million paid seats," but...
Read Article →Recently threat actors like Midnight Blizzard use the OAuth applications in tenants that they can misuse for malicious activity. Actors use comprom...
Read Article →This blog is going to show you some magical things that are happening in the background when you have enabled and configured Windows LAPS Automatic...
Read Article →The Global Administrator role in Microsoft Entra will soon enable administrators to access the Teams Devices section of the Teams admin center. The...
Read Article →The Graph User.ReadBasic.All permission is now available for both delegated and application usage. Think before rushing to use the permission. Alth...
Read Article →A January 26 post announces the deprecation of four old Exchange audit cmdlets in favor of the Search-UnifiedAuditLog cmdlet. Removing old cmdlets ...
Read Article →Learn how to Automatically create new accounts using Windows LAPS configuration settings in Microsoft Intune The post How to Enable Automatic Accou...
Read Article →Microsoft is changing the way that Exchange Online address book updates work to force users to use search rather than browsing through the GAL/OAB....
Read Article →Learn how to improve the performance of your Microsoft Graph PowerShell scripts by using Graph request batching. The post Improve Microsoft Graph P...
Read Article →The ability to apply custom corporate branding for Entra Id screens has existed since 2020. You can update elements through the admin center or Pow...
Read Article →In the past months, there has been a growing increase in QR Code phishing, since attackers are using new creative ways to bypass existing protectio...
Read Article →While playing around with Windows LAPS with an insider Windows canary build, I noticed that some improvements were made to Post Authentication Acti...
Read Article →Recent attacker activity made me think that access might have been gained through an OAuth app. Keeping an eye on app permissions is important. Fro...
Read Article →Tomorrow (Thursday January 25th) I have the pleasure to speak at the Cloud Guardians Unleashed event organized by the Microsoft Cloud and Client Ma...
Read Article →Microsoft plans to change the way that the Teams website channel tab works in early April 2024. Instead of the client opening a site, a new browser...
Read Article →Lots of hype surrounds Copilot for Microsoft 365, but I like the way that Copilot for Teams extracts real value from meeting transcripts to generat...
Read Article →Quickly configure baseline settings for Windows LAPS in Microsoft Intune using Microsoft Graph PowerShell. The post Configure LAPS in Intune using ...
Read Article →Last Updated on September 26, 2024 by Michael Morten Sonne Intoduction What is Defender for Identity Microsoft Defender… The post Microsoft D...
Read Article →MC705357 (9 Jan 2024) says that the dynamic group rule builder in the Entra ID and Intune admin centers no longer supports the contains and notCont...
Read Article →Learn how to package and auto-update apps in Intune using community-driven tools, WinTuner and Winget-AutoUpdate-Intune, for an efficient, l
Read Article →Microsoft's January 15 announcement reduced deployment costs and opened the possibility for Copilot for Microsoft 365 deployments to many Office 36...
Read Article →The essence of a good teams naming convention is simplicity and clarity. This article explains why those aspects are so important in terms of helpi...
Read Article →Entra ID registered apps can authenticate using app secrets and certificates. These credentials expire over time, so it’s good to review app creden...
Read Article →Microsoft Defender XDR is expanding in the full attack stage. With the new Deception capability in Microsoft Defender XDR, it is possible to detect...
Read Article →Document mismatch notifications tell users when they apply a higher-priority sensitivity label to documents than applied to the site. Some organiza...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction In the ever-evolving realm of IT, efficiency… The post PowerShell – Aut...
Read Article →Learn how to report the owners of all applications in Microsoft Entra using Microsoft Graph PowerShell and export to CSV. The post Report all Appli...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Stale Application Analysis for Entra ID – some… The post Entra ID – Stale App...
Read Article →Learn how to quickly backup any Exchange Online mailbox using Microsoft Graph PowerShell and export the files locally. The post Export Microsoft 36...
Read Article →Learn how to Connect to Microsoft Graph PowerShell using certificate based authentication in Microsoft Entra. The post Connect to Microsoft Graph P...
Read Article →Learn how to deploy the Microsoft 365 applications to Windows 10 and 11 devices using Microsoft Intune. The post How to Deploy Microsoft 365 Apps W...
Read Article →Entra ID supports user extension attributes but the same facility is unavailable for group objects. That seems strange, but it might be due to the ...
Read Article →In this blog, I am going to take a closer look at another EPM “flight” (AKA new feature) that Microsoft seems to be working on in Endpoint Privileg...
Read Article →Audit events generated for the new Stream look like any other SharePoint Online event. Extracting the Stream audit events takes a little more effor...
Read Article →In the recent parts of the blog post series, we have gone through the various capabilities to detect threats and fine-tune incident enrichment of W...
Read Article →Microsoft released in the past months additional protections for Microsoft Teams. The new Office protection is part of the Defender for Office prod...
Read Article →The Stream browser app has received a bunch of recent enhancements, some of which are still deploying to tenants. The changes make it easier for Mi...
Read Article →This year, the annual Microsoft Certified Trainer (MCT) summit will be held in the Netherlands. The event which takes place between 14-17 January w...
Read Article →A new Share Someone's Contact Info feature is available for Teams one-to-one and group chats. The option inserts a link to the person's profile car...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction Have you ever thinked about the Activity… The post Microsoft Defender X...
Read Article →Learn how to install WinGet on Windows 10 and 11 devices using Microsoft Intune to help with installing and updating applications during the AutoPi...
Read Article →Learn how to use Microsoft Graph PowerShell to generate a report of user permissions consented to applications in Microsoft Entra. The post How to ...
Read Article →Password profiles store the password settings for Entra ID user accounts. By updating the password profile, you can update an account's password an...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction This blog post covers a few of… The post Microsoft Defender XDR – Exper...
Read Article →In message center notification MC703706 Microsoft announces yet another attempt to retire the Search-Mailbox cmdlet. This time it's due to happen i...
Read Article →This article explains how I use custom document properties with SharePoint Online to track the topics covered by blog articles that I write. The cu...
Read Article →A new beta Graph API supports the creation of a Viva Engage community. This article explains how to use the Graph SDK to create a new community wit...
Read Article →Discover Microsoft Entra Private Access: advanced, secure remote access for corporate resources, surpassing traditional VPN limitations.
Read Article →Copilot for Word reference documents help to ground the prompts sent to LLMs for processing. The documents can be too large, which means that their...
Read Article →This is the first unofficial blog about a nice new Endpoint Privilege Management feature called Support Approved. I will show you what it looks lik...
Read Article →The January 2024 update for the Office 365 for IT Pros eBook is available for subscribers to download from Gumroad.com or Amazon. Like any monthly ...
Read Article →Last Updated on December 31, 2023 by Michael Morten Sonne Intoduction As we near the end of 2023,… The post Reflecting on 2023: A Year of Ach...
Read Article →Learn how to connect to Microsoft Graph PowerShell using a device code and obtain an access token without the PowerShell modules. The post Obtain a...
Read Article →A question came in about how to report admin consent requests as viewed through the Entra ID admin center. PowerShell does the trick, once you know...
Read Article →This article describes how to block welcome messages for new members of Microsoft 365 groups using a resource behavior option (a group setting). Th...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction The inability to create new users in… The post Entra ID – Quota Limit –...
Read Article →Introduction Adversaries are more and more interested in the data and infrastructure that lives in Cloud environments like Azure and Microsoft 365 ...
Read Article →Learn how to enable and deploy Microsoft Defender for Endpoint to Windows 10 and 11 devices using Microsoft Intune. The post How to Enable Defender...
Read Article →The Sensitive by Default control allows tenants to prevent external access to newly uploaded documents until DLP processing checks their content. T...
Read Article →Microsoft plans to make an eDiscovery hold report available to tenants in January 2024. This article explains how to use PowerShell to create a sim...
Read Article →Exchange Online Protection (EOP) and Microsoft Defender for Office 365 (MDO) are the email and collaboration security services native to Microsoft ...
Read Article →Learn how to configure web filtering policies using the Global Secure Access, Internet Access profile in Microsoft Entra. The post How to Configure...
Read Article →The Delve web app will be deprecated by Microsoft in December 2024. It's the end of a line for an app that once promised to reimagine search. The p...
Read Article →Collecting details of all workload identities in Microsoft Entra ID allows to build correlation and provide enrichment data for Security Operation ...
Read Article →Learn how to initiate bulk on-demand remediation packages on multiple machines at once using Microsoft Intune. The post Perform Bulk On-demand Reme...
Read Article →OAuth apps are a big part of the extensibility picture for Microsoft 365 tenants. As such, they are targeted by attackers as a good way to gain acc...
Read Article →Copilot for Word is an application-specific implementation of Microsoft 365 Copilot. Amongst its capabilities, Copilot can generate and rewrite tex...
Read Article →Lean how to create a local administrator account on your Windows devices really simple with Microsoft Intune. The post How to Create a Local Admin ...
Read Article →Microsoft's security strategy is all about AI with Security Copilot leading the charge. Even in a world of AI tools, knowing how to use KQL and Sen...
Read Article →For whatever reason, it's not possible to update the Default MRM policy to add the DeletedItems retention tag to process items in the Deleted Items...
Read Article →In this blog post, a fellow Dutchman (Jos Lieben) asked me if I could assist him with a weird error that occurred during the Intune/MDM enrollment....
Read Article →The preview app instance property lock feature designed to improve the security of Entra ID registered apps is becoming the default for new apps. I...
Read Article →Learn how to enable group owners to managed access reviews for guests in groups/teams that they are the own off. The post How to Create and Manage ...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction Yes – now we can see information… The post Microsoft Defender for...
Read Article →On July 11th, Microsoft announced that Azure AD would be renamed to Microsoft Entra ID. Microsoft also announced two new security offerings called ...
Read Article →Entra ID captures the lastSuccessfulSignInDateTime property to record the last successful sign-in action against user accounts. The new property is...
Read Article →Conditional access policies control access to Entra ID connections. Policies should have exclusions for breakglass accounts, but sometimes this doe...
Read Article →Last Updated on May 5, 2024 by Michael Morten Sonne Intoduction Enhancing Cybersecurity Operations Through Timely Stakeholder Notifications… ...
Read Article →This time not a deep dive blog but a simple little blog about fixing the missing Microsoft Teams group chats and the “Unknown User” in the mobile T...
Read Article →Sometimes unlearning things is harder than learning As you might have read somewhere Microsoft is busy implementing support for passkeys in their p...
Read Article →Cloudy attachments are links to files sent in messages. An auto-label policy can capture copies of cloudy attachments and make them available for e...
Read Article →Learn how to find which Operating System versions are within an ISO file and the OS details, using DISM commands. The post How to Find OS Details F...
Read Article →Learn how to prevent users from accessing the Microsoft Entra Admin portal and understand the impact of restricting access. The post How to Prevent...
Read Article →Exchange Online keeps message trace data online for 10 days and that's what's normally used to check for unused distribution lists. Checking over 9...
Read Article →In March 2021, I published the blogpost “Configuring Windows Update for Business settings for your Microsoft Endpoint Manager managed Modern ...
Read Article →SharePoint Embedded is a new Microsoft offering for application developers. The big upside is that apps can take advantage of the Microsoft 365 eco...
Read Article →Learn how to mass-install the Global Secure Access Client using Microsoft Intune. The post How to Deploy the Global Secure Access Client with Intun...
Read Article →Attack techniques has shown that service principals will be used for initial and persistent access to create a backdoor in Microsoft Entra ID. This...
Read Article →The December 2023 update (monthly update #102) for the Office 365 for IT Pros eBook is now available for subscribers to download. While Microsoft h...
Read Article →“If you know the enemy and know yourself, you do not need to fear the result of a hundred battles.” ~ Sun Tzu ⚔ I spoke at the Belgian ...
Read Article →A new setting in OWA options allows users to choose to preserve declined meetings. Keeping details of declined meetings can help users to find info...
Read Article →Check out this article via web browser: Prevent AiTM with Microsoft Entra Global Secure Access and Conditional Access Microsoft Entra Global Secure...
Read Article →Now available for OWA and the Monarch client, Outlook voice dictation allows users to compose the body text of messages with speech-to-text transcr...
Read Article →This week, the European SharePoint Conference (ESPC) is held between November 27 – 30 in Amsterdam the Netherlands. The event which will attr...
Read Article →In one of my last blog posts, I described how I noticed that Autopilot Version 2, AKA APV2, was coming. This blog is the second in the Autopilot v2...
Read Article →Check out this article via web browser: Evilginx resources for Microsoft 365 Okay, let’s start with a disclaimer. This post is created for ed...
Read Article →Learn how to generate and export Microsoft 365 mailbox usage reports for Exchange Online using Microsoft Graph PowerShell. The post Generate Mailbo...
Read Article →Entra ID’s P2 license (previously Azure AD Premium P2) unlocks the Privileged Identity Management (PIM). PIM is part of broader identity gove...
Read Article →Here’s a comprehensive overview of all Microsoft error codes. For deeper insights, I’ve linked to the detailed write-ups I’ve created for specific ...
Read Article →In December 2012, I blogged about best practices for deploying applications using System Center Configuration Manager, and while many of those reco...
Read Article →Check out this article via web browser: A love story about Role Based Access Control for Applications in Exchange Online, Managed Identities, Entra...
Read Article →This blog will focus on the 0x80190190 Bad Request (400) we could get because the SslClientCertReference is not configured and maybe a couple of ot...
Read Article →Learn how to force a password change for a Microsoft 365 user on the next log on, without changing the users password. The post How to Force a Pass...
Read Article →Learn how to turn off Microsoft Managed Conditional Access policies in Microsoft Entra to prevent them from being created. The post Customise or Di...
Read Article →Users can now change their password in Microsoft 365 online from the My Security Info page without having to enter their existing password. Learn h...
Read Article →Last Updated on November 2, 2023 by Michael Morten Sonne Intoduction The next Windows 11 version is here!… The post You can now finally upgra...
Read Article →Learn how to best use the Directory.AccessAsUser.All permissions as the signed in user with Microsoft Graph PowerShell. The post How to Simplify us...
Read Article →This blog will discuss my attempt to enroll my device with the latest 25977.1000 insider preview using Autopilot. I will show you how I stumbled up...
Read Article →Learn how to forward messages in Microsoft Teams chats from one chat to another and quote the original message. The post How to Forward Messages in...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Intoduction Update – 31/10/2023 – MacOS and Linux… The post Microsoft Defend...
Read Article →As an Microsoft 365 admin, you can use the Microsoft Entra admin portal to change a users default MFA method. The post How to Change the Default MF...
Read Article →Together with my colleague Louis Mastelinck, we talked on the Microsoft Sentinel user forum about Microsoft Sentinel data ingestion and avoiding al...
Read Article →Learn how to protect your Microsoft 365 Break Glass accounts and never get locked out of your organisations tenant with Azure Automation. The post ...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction Background Companies that do not implement Multi-Factor… The post Entra...
Read Article →Microsoft Applied Skills have now been released. A new and free verifiable credentials from Microsoft earned through lab-based assessments. The pos...
Read Article →This blog will be about my first encounter with APv2. Yeah!! APv2 As in Autopilot version 2. Did I get your attention??? I am going to assume I do....
Read Article →Microsoft 365 ends support of older clients including Office 2016 and Office 2019. Take action now to ensure you can continue to use the latest Mic...
Read Article →Boost security, speed, and access with Microsoft's Entra Internet for M365. A game-changer!
Read Article →Check out this article via web browser: Prepare for passkeys in Entra ID! Only a few months until Microsoft Entra ID will support device-bound pass...
Read Article →Check out this article via web browser: How to create a Temporary Access Pass using Logic Apps Now that more and more organizations are moving towa...
Read Article →Microsoft has released a new free Microsoft Purview Discovery plan which includes brand new features available for free tier users. The post Get Ah...
Read Article →Microsoft expands their Microsoft Purview audit log availability to standard users for premium exchange and SharePoint activities. The post Take Ad...
Read Article →Apply strong authentication methods through Conditional Access for PIM (Privileged Identity Management) role activation. The post How to Apply Cond...
Read Article →Learn how to assign Microsoft Graph API permissions to Managed Identities using Microsoft Graph PowerShell. The post Assign Permissions to a Manage...
Read Article →This blog will be the 7th one in the Windows Declared Configuration series (WinDc). In this WinDc series I am focusing on what the “Refresh Schedul...
Read Article →Learn how to modify the Microsoft Authenticator Registration Campaign settings to allow unlimited snoozes when prompted to register. The post Allow...
Read Article →Learn how to perform bulk management of group owners for Microsoft 365 groups using Microsoft Graph PowerShell. The post How to Bulk Update Microso...
Read Article →Learn how to change the output type to a PowerShell Custom Object when working with the Invoke-MgGraphRequest cmdlet in Microsoft Graph. The post H...
Read Article →With the outlook of the release of the new Curl version, I thought it would be nice to know where Curl is being run and where it is making network ...
Read Article →Error Connect-AzAccount : Method not found: ‘System.Threading.Tasks.Task`1 Azure.Identity.InteractiveBrowserCredential.AuthenticateAsync(Azur...
Read Article →Microsoft Entra MFA Fraud Deep Dive Tags: Entra, ITDR, MFA Published at: October 7, 2023 Summary: Recently, Microsoft released the new feature Repo...
Read Article →Conditional Access (CA) is front and center of any attempt to secure Microsoft 365. If you’ve spent any time securing your tenant and Entra r...
Read Article →Learn how to update user photos in Microsoft 365 using Microsoft Graph PowerShell with the Set-MgUserPhoto cmdlet. The post How to Update User Phot...
Read Article →After “finishing” (or maybe not yet) my WinDc blog series I am going to start looking at other stuff. One of the things that I am always interested...
Read Article →This blog will zoom in on, the MOF file and how the MI provider is being used when the declared configuration policies are being set
Read Article →IntroductionHello there, welcome back to part 4 of my Sentinel & SOAR series! If you’re new to this series you might want to check out any earl...
Read Article →Learn how to enable the Allow On-Premise Password Change to Reset User Risk feature in Microsoft Entra to manage risky users. The post Allow On-Pre...
Read Article →Learn how to prevent users from accessing BitLocker keys for the devices they own in the Microsoft Entra portal. The post How to Block User Access ...
Read Article →This blog will be about a big underestimated schedule!! I am going to dive into the PushLaunch scheduled task once again. This Task is responsible ...
Read Article →Learn how to enable and disable security defaults in Microsoft Entra programmatically using Microsoft Graph PowerShell. The post How to Modify Secu...
Read Article →Here are ten of my top tips for admins working with Microsoft Graph PowerShell to get the most out of their scripts. The post 10 Great Tips for Adm...
Read Article →This blog post will be the fifth in the WinDC Refresh Schedule series. In it, I will zoom into what happens when we run into corrupted Declarative ...
Read Article →This guide will get you up and running with MDE for macOS in no time.
Read Article →Learn how to restrict who can invite guest users to your tenant in Microsoft Entra and using Microsoft Graph PowerShell. The post How to Restrict G...
Read Article →Need to bulk import, export or document your Intune configurations, this guide has you covered.
Read Article →Starting on Wednesday September 27, till Friday September 29 the Workplace Ninja Summit which is an in-person event will take place in Baden, Swits...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction Fileservers – the never ending story for… The post Messed up NTFS...
Read Article →Learn how to deploy conditional access policies from pre-defined templates using Microsoft graph PowerShell. The post How to Deploy Conditional Acc...
Read Article →Check out this article via web browser: Enforce FIDO2 PIN complexity with Microsoft Entra Conditional Access Authentication Strengths. As you may o...
Read Article →Learn how to enable Enterprise Voice for Microsoft Teams direct routing users using Microsoft Teams PowerShell. The post How to enable Enterprise V...
Read Article →Learn how to target specific Microsoft Entra tenants in Multitenant organisations using Conditional Access policies. The post How to Target Specifi...
Read Article →Learn how to use the New-MgGroupMember cmdlet to add users to groups in Microsoft 365 using Microsoft Graph PowerShell. The post How to Add Users t...
Read Article →This blog will be about my first and second encounters with Microsoft Azure Attestation(MAA) and how this new kind of attestation will be dropped d...
Read Article →Learn how to Setup Cross-Tenant Synchronisation in Microsoft Entra step by step to automatically provision B2B user access. The post How to Setup M...
Read Article →Last year Microsoft announced a new feature called; Automatic attack disruption which uses correlated insights from the Microsoft 365 ecosystem and...
Read Article →Intro Microsoft published this summer new capabilities and enhancements for Defender for Endpoint on linux. In my opinion Defender for Endpoint on ...
Read Article →Learn how to use Get-MgUserMemberOf in Microsoft Graph PowerShell to find which groups a user is a member of and report for all users. The post How...
Read Article →Learn how to when and how to use the strictly enforce location policies setting in Conditional Access. The post How to use Strictly Enforce Locatio...
Read Article →On Thursday September 7th, the annual Cloud Identity Summit will take place as an in-person event in Koblenz Germany. This event is organized by Th...
Read Article →This blog post will be the third one in my journey to discover what the “refresh schedule created by Declared Configuration to refresh any settings...
Read Article →Workload identities should be covered by lifecycle management and processes to avoid identity risks such as over-privileged permissions but also in...
Read Article →Learn how to block an email address or Domain for all users in Exchange Online using the Microsoft 365 defender portal. The post How to Block a Dom...
Read Article →Learn how to apply Conditional Access policies based on the time of day and the day of the week by configuring time-based conditions. The post Enab...
Read Article →In this blog, I am going back to my “roots” and taking another look at Autopilot. To be a bit more precise, I am going to look at how the […]
Read Article →Learn how to use New-MgIdentityConditionalAccessPolicy to create Conditional Access policies with Microsoft Graph PowerShell. The post How to Creat...
Read Article →Learn how to revoke API permissions assigned to applications in Microsoft Entra using Microsoft Graph PowerShell. The post How to Revoke Applicatio...
Read Article →Live Response is a powerful feature as part of the Microsoft 365 Defender portal. With the use of Live Response Security Operations Teams can estab...
Read Article →Learn how to setup User Risk and Sign-in Risk reports in Microsoft Entra using the admin center and Microsoft Graph PowerShell. The post How to Set...
Read Article →This blog is an addition to my previous blog, which showed you the difference between Entra Registered devices and Entra Joined devices. In this bl...
Read Article →Cause Old version of Az.Accounts v2.9.1 was being installed on the computer as part of Az.Portal installation, even though newer ... Read more
Read Article →This blog will give you insight on how to setup collection of DNS Events from Windows devices using Azure Monitor ... Read more
Read Article →Learn how to turn off directory synchronisation (Azure AD Connect) using Microsoft Graph PowerShell to disable on-premise synchronisation. The post...
Read Article →Learn how to configure Protected Actions in Microsoft Entra with an Authentication Context to protect with Conditional Access policies. The post Ho...
Read Article →Microsoft supports multiple onboardings methods for Defender for Endpoint. For non-persistent VDI’s there is always a challenge since non-per...
Read Article →Learn how to modify how Microsoft 365 handles DMARC for inbound mail with DMARC policies in Microsoft Defender. The post How to Modify DMARC Polici...
Read Article →Intro This blog post is inspired by Rudy Ooms, who wrote a excellent write up about the behind the scenes of the MDE attach v2 process and security...
Read Article →Warning We ‘archived’ this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more t...
Read Article →This blog will be just me changing 1 of the four words of MMP-C, nothing more! Curious how I am writing a whole blog about it? Please read on!
Read Article →Workload identities will be used by applications, services or cloud resources for authentication and accessing other services and resources. Especi...
Read Article →After upgrading Microsoft Graph, I noticed an issue when trying to run cmdlet Get-MgGroup or Get-MgUser. I could connect to ... Read more
Read Article →Learn how to configure Registration Campaigns in Microsoft Entra to prompt users to configure the Authenticator app for MFA. The post How to Setup ...
Read Article →[Important changes] PnP.Powershell – Are you using PnP.Powershell (or considering to update) to manage your Microsoft 365 environments and pr...
Read Article →This blog post will be the second one in my journey to discover what the “refresh schedule created by Declared Configuration to refresh any setting...
Read Article →Learn how to fix 550 5.7.509: Access denied, sending domain contoso.com does not pass DMARC verification and has a DMARC policy of reject in Exchan...
Read Article →Recently Microsoft announced a new firmware scanning feature in Defender for IoT. With the new Defender for IoT Firmware analysis, it is possible t...
Read Article →This blog will show you how you can automate an overview using Kusto queries against Azure Resource Graph (ARG) to ... Read more
Read Article →This time, a simple blog about a BitLocker escrow error (0x80072f8f )that started happening (all of a sudden) on multiple devices when you were try...
Read Article →With the use of Defender for Cloud Apps in combination with Defender for Endpoint it is possible to block unsanctioned apps, the block of apps is p...
Read Article →Last Updated on September 24, 2024 by Michael Morten Sonne This may be split up in 2 parts..… The post How is it now you get a refund for Mic...
Read Article →Learn how to use Conditional Access to protect user logins to Microsoft Graph using the Microsoft Graph PowerShell SDK. The post Protect Microsoft ...
Read Article →This time, a simple blog without technical details. It will be just me showing you why I am so enthusiastic about a specific service called MMP-C a...
Read Article →Intro Malicious actors actively search for machines with open management ports, such as RDP or SSH, to exploit. All of your virtual machines are po...
Read Article →Recently Microsoft announced a couple of new improvements related to the new security settings management for Windows, macOS, and Linux as part of ...
Read Article →I will guide you through my MDE Attach V2 (Security Management) journey and explain which "service" delivers the Intune policies to your NOT AADJ (...
Read Article →Learn how to setup Microsoft Entra Internet Access with Conditional Access to secure access to Microsoft 365 apps and services. The post How to Set...
Read Article →Check out this article via web browser: Manage user-preferred multi-factor authentication method in Microsoft Entra ID This post is all about setti...
Read Article →In this series, I will try to explain more about a wonderful "refresh schedule" I noticed in the task scheduler after EPM was deployed. This first ...
Read Article →Learn how to use the Microsoft Graph Explorer tool to support you with understand the Graph API and writing PowerShell Scripts. The post How to use...
Read Article →In one of the biggest changes to Microsoft Defender for Endpoint (MDE) in its product history, you no longer need a separate management engine to c...
Read Article →Learn how to monitor for application admin permission consents in Azure AD using PowerShell and Azure Automation. The post How to Monitor for Appli...
Read Article →Defender for Storage is the Azure-native layer of security intelligence that detects potentially harmful attempts to access or malicious activity. ...
Read Article →Last Updated on October 6, 2024 by Michael Morten Sonne Intoduction Microsoft’s Defender for Endpoint (MDE) – is… The post Lets create ...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Intoduction Frist – sorry for the size og… The post Azure AD – Why use Cloud-Only ...
Read Article →Learn how to use the Connect-MgGraph cmdlet with the -Identity parameter to connect with System and user-assigned managed identities. The post How ...
Read Article →Background story During my consultancy work, I have received feedback from numerous clients indicating that they consistently encountered difficult...
Read Article →Last Updated on January 19, 2024 by Michael Morten Sonne Intoduction In the world of PowerShell, modules play… The post The Importance of Upd...
Read Article →In this blog, I am going to scuba dive a bit into the wonders of SyncML and how all devices ended up with sync errors and all new Autopilot enrollm...
Read Article →Last Updated on June 25, 2023 by Michael Morten Sonne How secure your Azure Management Portal?. By default,… The post Secure your Azure Manag...
Read Article →Intro When you want to investigate a endpoint that has indication of being comprised you might want to put the endpoint in Defender for Endpoint is...
Read Article →My first public speaking experience! I spoke together with my colleague Sander Bougrine on MC2MC, where we deep dived into how to integrate 3th par...
Read Article →Check out this article via web browser: Company branding and custom CSS in Azure Active Directory Company branding in Azure AD is a nice feature th...
Read Article →LAPS everywhere!!!! This time I am deep-diving into the wonders of the Post Authentication Actions (PAA) and what is actually happening (or maybe n...
Read Article →In the today’s digital age and use all over the world, maintaining the security of an organization has… The post Azure AD Application Activit...
Read Article →Using Azure Automation Accounts to send scheduled emails, ditch those scheduled tasks and insecure scripts!
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne In the post here, I will share 10… The post 12 quick tips to secure your identities in...
Read Article →This blog will be an additional blog post to the MMP-C one. In this blog, I am deep-diving into the first MDE / MMP-C / Declared Configuration enro...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Customer Lockbox is a security feature in Microsoft… The post What is Customer lockbox...
Read Article →*UPDATE 17/07/2023* Added extra information about system labels Intro Microsoft is doing a very good job at listening to their customers, partners ...
Read Article →Intro Welcome to part three of the blog series on Unleach the power of Defender for Servers Plan 2! In our previous blog, we explored how to start ...
Read Article →Check out my latest 2 videos, which will cover both migration scenarios using my AzLogDcrIngestPS PS-module: Side-by-Side Migration (new table, ......
Read Article →Check out this article via web browser: Running Evilginx 3.0 on Windows In case you missed it: Evilginx 3 was recently launched to the public. This...
Read Article →Restricted Management Administrative Unit (RMAU) allows to protect objects from modification by Azure AD role members on directory-level scope. Man...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Best known as “Customer lockbox”, the new name… The post What is Customer ...
Read Article →Check out this article via web browser: Step-up authentication with Defender for Cloud Apps and Authentication Context In this post, I will show yo...
Read Article →In this blog post, I will explore the wonders of Windows LAPS and what happens when you remotely perform a password rotation from Intune—nothing mo...
Read Article →Intro Up until now, onboarding non-Azure servers to Defender for Servers required Azure Arc as a mandatory pre-requisite. With this new release, Mi...
Read Article →Last Updated on January 10, 2024 by Michael Morten Sonne In case you were trying to download evaluation… The post Evaluation Center was unava...
Read Article →Last Updated on January 10, 2024 by Michael Morten Sonne When you create a new Shared Mailbox in… The post Exchange Online – Block sign-in fr...
Read Article →Previously, onboarding hybrid servers to Defender for Servers with MDE required Azure Arc as a pre-requisite for the deployment. Since the standalo...
Read Article →Check out this article via web browser: Send an email on a new Azure MFA method registration I’ve done quite some Azure MFA projects over tim...
Read Article →Microsoft Defender Threat Intelligence (MDTI) previously known as RiskIQ brings the threat intelligence data together from multiple sources. With t...
Read Article →Are you using Intune Endpoint Privilege Management (EPM) and wondering what is “needed” when you launch a process with elevated access?...
Read Article →Warning We ‘archived’ this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more t...
Read Article →Check out this article via web browser: Microsoft icons That’s the post for today. Just a bunch of sources with icons from Microsoft 365, Azu...
Read Article →We talked about this in our MMSMOA session, but I still needed to write something about it…..so here we go! This blog will be “again...
Read Article →Welcome, this is the second part of the Defender for server P2 advanced protection series I will blog about. If you want to read the other pa...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne So you’d like to build an Active Directory… The post Building an Active Directory/Wind...
Read Article →Recently there was some news with new gTLD domains. Google Registry launched eight new top-level domains: .dad, .phd, .prof, .esq,...
Read Article →Last Updated on June 19, 2023 by Michael Morten Sonne Intoduction What is Azure DevOps Azure DevOps is… The post Azure DevOps – Use Azure Key...
Read Article →Last Updated on June 19, 2023 by Michael Morten Sonne Intoduction Seperate accounts in Azure AD for Administrative… The post Azure AD Admin a...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Discover & manage vulnerabilities in your network devices… The post Network Device...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne What is TAP? TAP is a time-limited passcode… The post Secure authentication meth...
Read Article →Last Updated on February 18, 2024 by Michael Morten Sonne Introduction This tool offers a user-friendly interface and… The post Azure DevOps ...
Read Article →Last Updated on August 13, 2023 by Michael Morten Sonne Intoduction What is a Break Glass Account? Break… The post Break Glass account – and ...
Read Article →Intro This blog will be about an issue I bumped into when deploying one of the enhanced protection features in defender for cloud. The enhanced fea...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →Check out this article via web browser: Report Suspicious Activity & Fraud Alert for Azure MFA A new feature popped up in Azure AD. Well, not ...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Intro Do you want to get started learning… The post Set up a free Microsoft Intune lab...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Are backups required for Microsoft 365? We look… The post Veeam Backup for Microsoft 3...
Read Article →Microsoft Defender Threat Intelligence (MDTI), previously known as RiskIQ brings threat Intelligence data together from multiple sources. With Micr...
Read Article →This blog will be small and simple, but it will be about me looking at how the Endpoint Privilege Management reports will be delivered to Intune. O...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne If you are like me, you probably use… The post How to disable Automapping for a shared...
Read Article →This blog will show you how to “Kickstart” your Declared Configuration enrollment on your own turf when the EPM agent is not being depl...
Read Article →Human-operated ransomware (HumOR) is growing and needs different layers of protection. Microsoft released some new features to protect against C2 c...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs. I am working on updating this for the UI changes that have been ...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne How to schedule an Exchange Online PowerShell script… The post Configure Exchange Onli...
Read Article →Last Updated on June 19, 2023 by Michael Morten Sonne Intoduction This is in relation to my last… The post How to use Windows LAPS – PowerShe...
Read Article →This blog will be just me looking at the delivery of the EPMagent in my own troubleshooting style. While doing so, I got focused on something even ...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne While DES has long been considered insecure, CVE-2022-37966… The post Find Active Dire...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Microsoft has finally implemented the feature “Idle session… The post Microsoft 365: W...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Introduction ORCA is a report that you can… The post The Microsoft Defender for Office...
Read Article →Last Updated on June 19, 2023 by Michael Morten Sonne What is Windows LAPS Exciting News! New Built-in LAPS… The post Windows LAPS and m...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs. We no longer need to manually load modules as shown, and this ar...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne This is a knowledgebase item. Hope it helps… The post Self Service Password Reset writ...
Read Article →Last Updated on July 9, 2023 by Michael Morten Sonne Secure your Azure environment with the power of… The post Securing your Azure/Microsoft ...
Read Article →A Compliant device, I want myself to have a working Intune enrolled compliant device!!!! Nothing more! Just a compliant device! In this blog, I wil...
Read Article →Intro Welcome to part 1 of the blog series about enhanced protection features available in Defender for Servers Plan 2. Part 1 will be about ...
Read Article →Why is this needed? Admins who are using Azure AD Connect are currently receiving email notifications when there… The post Configure Azure AD...
Read Article →If you are sending data using HTTP Data Collector API (REST) today, you should continue reading, as this API will ... Read more
Read Article →If you are sending data using HTTP Data Collector API (REST) today, you should continue reading, as this API will ... Read more
Read Article →Introduction I decided to start a blog series about the Advanced protection features which are included in the Defender for Servers Plan 2 provided...
Read Article →Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP). Defender for Cloud contains a large set of features and cap...
Read Article →In all environments, reducing the vulnerability surface and getting insights into the vulnerable applications are recommended and important. Micros...
Read Article →Deploy Microsoft Teams to Azure Virtual Desktop using Intune.
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs. I am working on updating this for the UI changes that have been ...
Read Article →Deployment guide for Microsoft Defender for Identity.
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →If you are sending data using HTTP Data Collector API (REST) today, you should continue reading, as this API will ... Read more
Read Article →Are you in control? – or are some of your core infrastructure processes like patching, antivirus, bitlocker enablement driftin...
Read Article →This blog will give you insight on how to setup collection of syslogs (CEF) using Linux forwader server using Azure ... Read more
Read Article →This blog will give you insight on how to setup collection of IIS logs from Windows devices using Azure Monitor ... Read more
Read Article →This blog will give you insight on how to setup collection of Performance and ServiceMap information from Linux and Windows ... Read more
Read Article →This blog will give you insight on how to setup collection of Security Events (eventlog) from Windows devices using Azure ... Read more
Read Article →This blog will give you insight on how to setup collection of syslogs using Linux forwader server using Azure Monitor ... Read more
Read Article →This blog will give you insight on how to setup collection of System & Application Events (eventlog) from Windows devices ... Read more
Read Article →This blog will give you insight on how to setup collection of text logs from Linux and Windows devices using ... Read more
Read Article →This blog will demonstrate how you can do workspace transformation to support legacy data transformation where data is being uploaded ... Read more
Read Article →I am really passioned about the logging capabilities in M365 Defender and Azure with the power to bring data back from cli...
Read Article →This section will show you the steps for setting up data transformations – and how you can do the transformation ... Read more
Read Article →Azure Data Collection Endpoint (DCE) provide a connection for certain data sources of Azure Monitor. This article gives you an ... Read more
Read Article →Azure includes lots of great technologies, which can be used for logging purpose. Currently, Microsoft is transitioning from v1-method (MMA) ... Re...
Read Article →This blog will take you “under the hood” of extensions, Azure Monitor Agent (AMA) and Azure Data Collection Rules for ... Read more
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →Last Updated on April 15, 2023 by Michael Morten Sonne Welcome to My New Blog! Hey there! If… The post Welcome! first appeared on Blog - Sonn...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →This small blog will be about the errors 0x81039001 and 0x80190190 you could get when enrolling your device with Autopilot (Self Deploying or Pre-P...
Read Article →Intro This post is inspired on different setups I saw while working with my clients. More and more clients are leveraging the Azure Monitoring Agen...
Read Article →Warning We ‘archived’ this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more t...
Read Article →Live Response in Microsoft 365 Defender can be used to execute PowerShell scripts on protected devices for advanced incident investigation. But it ...
Read Article →When using Autopilot for pre-provisioned deployments, you might encounter non-compliant devices that have yet to be evaluated. This blog will expla...
Read Article →Check out this article via web browser: Authenticator Lite – Approve Azure MFA prompts with the Outlook app Microsoft released a new feature ...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →This blog will show you how I started troubleshooting an issue in which Microsoft Store Apps failed to install. I will guide you through the PowerS...
Read Article →Check out this article via web browser: System-preferred multifactor authentication in Azure AD. Don’t settle for less. A new feature has pop...
Read Article →Microsoft Defender SmartScreen is available in various Microsoft products and adds an extra/first layer/filter of protection. The core component of...
Read Article →This blog takes a closer look at if—and how Remediations (former name ProActive Remediations) are executed during the Enrollment Status Page (ESP),...
Read Article →Microsoft Defender for Endpoint is available for multiple platforms including Windows, macOS, and Linux. For mobile platforms Defender for Endpoint...
Read Article →This blog focuses on Windows Autopilot, specifically taking a closer look at the 'Allow Autopilot Pre-Provisioning' option in your Windows Autopilo...
Read Article →Microsoft has extended the capabilities of Azure AD authentication context to Azure AD Privileged Identity Management (PIM). By doing this we can t...
Read Article →Check out this article via web browser: Duplicate Azure Active Directory Conditional Access policies In this post, we look at managing Conditional ...
Read Article →Microsoft Defender for Endpoint (MDE) is a massive stack of endpoint protection and endpoint detection and response (EDR) capabilities. It integrat...
Read Article →In this blog, I will show you how important MSA Tickets are. These tickets are of utmost importance when the device needs to authenticate a Microso...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →It is time for part 10 of the Microsoft Defender for Endpoint (MDE) series. The final part of the series. Part 10 is focussed on tips and tricks ar...
Read Article →Warning We ‘archived’ this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more t...
Read Article →It is time for part 9 of the Microsoft Defender for Endpoint (MDE) series. Part 9 is focused on the automation part of Defender for Endpoint with t...
Read Article →This blog covers 2 topics : (1) how you can automate clean-up of any orphaned security principal role assignments – ... Read more
Read Article →Cross tenant sync is a feature I've been waiting to see for a while and with the announcement of cross tenant access settings, I knew it...
Read Article →Background Recently, I was asked to build a simple reporting-script, which integrates data from Microsoft Defender for Cloud and Azure ... Read more
Read Article →You can find my previous blog posts on my medium site. Block the automated onboarding of mde without disabling the mde integration: https://medium....
Read Article →Note This article was last updated on 01/27/2025 for readability and updated URLs, and the content itself will be updated in the near future :)
Read Article →Introduction Hosting a blog these days can easily be done without having to cost anything. There are a lot of solutions in the likes of Medium, Wee...
Read Article →System Monitor (Sysmon) is one of the most common add-ons for Windows logging. With Sysmon, you can detect malicious activity by tracking code beha...
Read Article →It is time for part 8 of the Microsoft Defender for Endpoint (MDE) series. Part 8 is focused on the hunting experience in Microsoft 365 Defender. T...
Read Article →Back in May of last year, I started building a new server and had planned to fully share the process of putting it together, setting up the OS, tem...
Read Article →Note Unfortunately, the images from this article were never able to be recovered, and it is unlikely I will be able to recreate them. Email securit...
Read Article →This blog will be about me troubleshooting the “Something Went Wrong” error you could get during the Account Enrollment Status Page when enrolling ...
Read Article →It is important to ensure that your security posture systems are up-to-date to be able to prevent attacks. Microsoft Defender ... Read more
Read Article →This blog is about keeping long-term Sentinel logs, giving you insight to the options today – with great opportunities to ... Read more
Read Article →It is time for part 7 of the Microsoft Defender for Endpoint (MDE) series. All previous parts were focused on Defender for Endpoint and additional ...
Read Article →In this blog, I will focus a bit more on what Windows Autopilot is and what it is built upon. To explain the building blocks of Windows Autopilot, ...
Read Article →Do you want to automate alert rules including creating new alert rules and update existing – with checks every x ... Read more
Read Article →The first blog of 2023 will be about me staring, gazing, and trying to explain the funny parts of the OfflineDeviceID. While trying to explain, I w...
Read Article →It is time for part 6 of the Microsoft Defender for Endpoint (MDE) series. All previous parts were focused on onboarding and configuration and Micr...
Read Article →Check out this article via web browser: Mailbox usage reports, Graph API, and Logic Apps. What’s not to like? Exchange Online does a pretty g...
Read Article →This is a real-life example of how I helped reduce the log-cost by 43% for LogAnalytics & Sentinel combined for ... Read more
Read Article →Have you ever wondered what is causing your ‘Antimalware service executable’ (Defender Antivirus) to spike the CPU for longer times? .....
Read Article →Great job Michael Grafnetter Initially, I would like to thank the author of DSInternals, Microsoft MVP Michael Grafnetter, for creating ... Read more
Read Article →Have you ever had a need to collect vital configuration status (inventory) from thousands of servers – with a defined ... Read more
Read Article →Microsoft’s Defender Vulnerability Management is a built-in module in Microsoft Defender for Endpoint that can: If you’ve enabled ...
Read Article →Recently I was asked to provide a solution to detect file deletions on a file server in a sensitive folder ... Read more
Read Article →CONTROLLED FOLDER ACCESS RULES ControlledFolderAccess – All excluding Temp ControlledFolderAccess – Only Temp ATTACK SURFACE REDUCTION ...
Read Article →One of the cool features in Azure LogAnalytics is the capability to do data-transformation before the data enters your LogAnalytics ... Read more
Read Article →Microsoft Defender for Identity (MDI) has a built-in process that handles continues updates. I had a situation, where this process ... Read more
Read Article →On December 14, I had the pleasure of participating in a live show, Microsoft Security Insights Show. The topic was ... Read more
Read Article →Check out this article via web browser: Break glass accounts and Azure AD Security Defaults Security Defaults is the best thing since sliced bread....
Read Article →In this blog, I will examine the Autopilot Hardware Mismatch Remediation Data thoroughly. Please note: I will make many assumptions and guesses abo...
Read Article →Conditional Access and Entitlement Management plays an essential role to apply Zero Trust principles of “Verify explicitly“ and “Use least-privileg...
Read Article →I’m proud to announce the December 2022 update of my Conditional Access demystified whitepaper. With this release, we have reached the fifth ...
Read Article →This blog shows how a Windows device retrieves its Autopilot profile from the ztd.dds.microsoft.com service during OOBE. More importantly, we’ll se...
Read Article →This blog will be an additional part of the blog I wrote about my experiences when deploying UWP /Store Apps with the New store App functionality i...
Read Article →This blog will show my experiences with Intune’s new Microsoft Store App functionality. I wanted to publish the next part of my Autopilot ser...
Read Article →In this article I describe how to enable IE mode on your Intune enabled devices and how you can easily manage a corporate site list!
Read Article →This new blog will be about me (again) dealing with some issues while enrolling a device with Autopilot. While trying to re-enroll the same device ...
Read Article →In the last couple of months, Microsoft released new functionality for Azure AD Conditional Access. All of this functionality is still in public pr...
Read Article →This blog will not be a deep dive into a weird issue but will be more like an explanation of when you want to silently install and uninstall a Win3...
Read Article →In the last couple of months, Microsoft released new functionality for Azure AD Conditional Access. All of this functionality is still in public pr...
Read Article →Warning We ‘archived’ this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more t...
Read Article →In the last couple of months, Microsoft released new functionality for Azure AD Conditional Access. All of this functionality is still in public pr...
Read Article →It is time for part 5 of the Microsoft Defender for Endpoint (MDE) series. All previous parts were focused on the Defender for Endpoint onboarding ...
Read Article →Check out this article via web browser: Goodbye legacy SSPR and MFA settings. Hello Authentication Methods Policies! I’ve got some exciting n...
Read Article →This blog will show you my first experiences dealing with Winget and installing Store Apps from the Microsoft Store as a regular user. I will try t...
Read Article →Microsoft has been released a feature to automate on- and off-boarding tasks for Azure AD accounts. Lifecycle workflows offers built-in workflow te...
Read Article →Note This article was last updated on 01/27/2025 for readability and updated URLs, but content review and image updates are in process :)
Read Article →Check out this article via web browser: Synchronize attributes for Lifecycle workflows – Azure AD Connect Sync Azure AD Lifecycle Workflows c...
Read Article →Note This article was last updated on 01/27/2025 for readability and updated URLs, but content review is in process. New guidance is to enable the ...
Read Article →This blog will be about an old Autopilot feature called “Convert All targeted devices to Autopilot”. I dedicated a small blog to this wonderful fea...
Read Article →It is time for part 4B of the ultimate Microsoft Defender for Endpoint (MDE) series. Part 4A explains the AV policy baseline. Now it is time f...
Read Article →This blog will be about (yes… again) an Intune sync issue. After we took over management of a Microsoft Tenant from a new customer, we notice...
Read Article →After the initial onboarding of Microsoft Sentinel, connectors can be used for ingesting data. Microsoft invested in pre-build connectors which can...
Read Article →It is time for part 4A of the ultimate Microsoft Defender for Endpoint (MDE) series. Part 4 explains the AV/ next-generation protection component. ...
Read Article →It is time for part 4 of the ultimate Microsoft Defender for Endpoint (MDE) series. All previous parts were focused on the initial Defender for End...
Read Article →In this blog, I will summarize some of the ADMX/ADML upload errors I got while playing around with them. Of course, I will also try to show you wha...
Read Article →Today, I wrote a simple blog that will be about troubleshooting one of the ADMX upload (file referenced not found) error you could endure when uplo...
Read Article →This blog will be about me showing and explaining the Intune Sync Debug PowerShell tool I wrote to fix those damn Intune MDM device CA certificate ...
Read Article →Microsoft released a new product with the name; Microsoft Defender EASM (External Attack Surface Management). The new product is based on the earli...
Read Article →This blog will be about me looking at the Intune Device Certificate renewal process and what happens behind the curtains 1. Introduction I guess we...
Read Article →Check out this article via web browser: How to keep track of changes on Microsoft Docs & Learn? When working with cloud services like Microsof...
Read Article →This article will go into detail on how to configure Azure MFA for access to on-premises VPN and RD Gateway.
Read Article →Check out this article via web browser: The road to Microsoft MVP and beyond Today, a slightly different post. I think it’s time to step away...
Read Article →This blog is going to show you how to create custom ADMX templates within a couple of minutes to deploy some HKEY_CURRENT_USER settings to your Int...
Read Article →Microsoft Defender for Identity MDI (previously called Azure Advanced Threat Protection or Azure ATP) is a Microsoft security solution that capture...
Read Article →Check out this article via web browser: Automate issuing Temporary Access Pass for joiners with LifeCycle Workflows On September 30th, 2022, Pim Ja...
Read Article →On October 7, 2022 the AppManagEvent will be organized in the Media Plaza, Jaarbeurs Utrecht. The AppManagEvent is an initiative from PDS b.v. in t...
Read Article →It is time for part 3D of the ultimate Microsoft Defender for Endpoint (MDE) series. After Part 3C (Onboard Defender for Endpoint using Azure Arc) ...
Read Article →In this new blog, I will discuss a big Windows Autopilot misunderstanding. I will try to explain and convince you why blaming Autopilot is not alwa...
Read Article →Besides helping organizing Experts Live NL 2022 in my role as speaker manager together with Erik Loef, I’m also happy to announce that I will...
Read Article →A brief overview on how you can deploy applications using winget in Microsoft Intune and even keep them updated!
Read Article →Hackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks. With the rise of mo...
Read Article →This blog will show how a broken PowerShell script could cause a 30-minute delay in your Enrollment Status Page (ESP) when enrolling a device with ...
Read Article →Check out this article via web browser: KB – Write requests (excluding DELETE) must contain the Content-Type header declaration. This is a kn...
Read Article →File Integrity Monitoring (FIM) is a technology that monitors and detects file changes that could be indicative of a cyberattack. File Integri...
Read Article →Check out this article via web browser: Take control of your guests with the External Identities Policy Today we take a look at the brand new Exter...
Read Article →Admit it, we've all fallen foul of that annoying (and scary for some) popup that seems to rear it's ugly head after you've spent the last...
Read Article →It is time for part 3C of the ultimate Microsoft Defender for Endpoint (MDE) series. After Part 3B (Onboard Defender for Endpoint using Defender fo...
Read Article →It is time for part 3B of the ultimate Microsoft Defender for Endpoint (MDE) series. After Part 3A (Onboard Defender for Endpoint using Microsoft I...
Read Article →Recently I found myself in a scenario where I needed to quickly and easily access a calendar from a Microsoft Teams group, I didn't think...
Read Article →It is time for part 3A of the ultimate Microsoft Defender for Endpoint (MDE) series. After Part 3 (Onboard Defender for Endpoint) it is now time fo...
Read Article →Do you have devices that are missing the Intune Device Certificate or have sync issues? This blog will show you a possible root cause and how to so...
Read Article →Identity attacks are currently changing and focussing on new techniques. In the past years, many organizations protected accounts with MFA/ FIDO2 a...
Read Article →It is time for part 3 of the ultimate Microsoft Defender for Endpoint (MDE) series. After part 2 (configuration MDE) we are now going to ...
Read Article →This blog will discuss some TPM Attestation issues you could encounter when running Windows Autopilot for Pre-provisioned deployments and how to tr...
Read Article →This is the updated “matrix” of OS supported for the almost 80 features, services, and important components that make up Microsoft Defe...
Read Article →This blog will explain what the “Ready for Attestation” flag truly means and show you how to ensure the device is Ready for Attestation so you won'...
Read Article →After speaking virtually on the Workplace Ninja Summit 2020 and Workplace Ninja Summit 2021, I’m really proud to announce that I will also sp...
Read Article →Check out this article via web browser: Block users from viewing their BitLocker keys This post is mainly focused on a new tenant setting, where yo...
Read Article →After being on a nice vacation for 2 weeks now, I felt the urge to write this simple blog to show you how to deal with a not responding Microsoft [...
Read Article →Defender for Cloud was since the release based on the Microsoft Monitoring Agent (MMA). Since august 2022 it is possible to auto-deploy the Azure M...
Read Article →This blog shows how to hold off required Intune app installs until after Autopilot enrollment, using a practical PowerShell script as a requirement...
Read Article →In the last couple of weeks, many researchers warns of a new large-scale phishing campaign that is using the adversary-in-the-middle (AiTM) techniq...
Read Article →In one of my earlier blogs, I discussed the IME installation flow and the global retry schedule. I showed you how the retry schedule looks at the E...
Read Article →This blog will be about the 0x800705b4 (Time-Out) error I got during the Autopilot “Preparing your device for mobile management” step. Please note ...
Read Article →You can find my previous blog posts on my medium site. Defender for servers mde onboarding behind the scenes: https://medium.com/@vertho/defender-f...
Read Article →It is time for part 2 of the ultimate Microsoft Defender for Endpoint (MDE) series. After part 1 we are now going to deep-dive more into the initia...
Read Article →When a Win32app fails to install, figuring out the root cause can be frustrating. We often need to trigger the installation repeatedly to get to th...
Read Article →Check out this article via web browser: How to set up Evilginx to phish Office 365 credentials Update: Evilginx 3 is here! This post is based on Ev...
Read Article →After reading a question on Reddit about how Intune knows which device belongs to which organization, I decided to write a dedicated blog post abou...
Read Article →After all of the Autopilot issues and AAD sign-in errors in March 2022, I need to explain this OOBEAADV10 error a little bit better. 1. Introductio...
Read Article →This blog will be about version 3 of the sort of update tool I have been creating or many I am creating. This Update tool will make sure that some ...
Read Article →Check out this article via web browser: How to deal with orphaned objects in Azure AD (Connect) We have done hybrid identity for a couple of years ...
Read Article →This blog will NOT be about the new Autopatch function! Of course not! This blog will be about multiple weird Intune Device sync errors I was asked...
Read Article →Microsoft announced earlier this year that it would block VBA macros on downloaded documents by default for all customers. Last week Microsoft anno...
Read Article →It is time for the first part of the ultimate Microsoft Defender for Endpoint (MDE) series. After the announcement and the great response, it is ti...
Read Article →After a nice talk with Yannick Van Landeghem, who made me aware of a “possible” security gap when using a Temporary Access Pass (TAP), I decided to...
Read Article →Check out this article via web browser: Use a FIDO2 security key as Azure MFA verification method This news seems to be kept under the radar a litt...
Read Article →In this blog, I’ll discuss the unexpected challenges I encountered during an Autopilot deployment, specifically the 0x000008CA error. This er...
Read Article →Check out this article via web browser: Get alerts on Azure resource assignments made outside PIM Microsoft released a new public preview where adm...
Read Article →Troubleshooting Windows Device Enrollment errors can be a pain! In this post, we will guide you through resolving issues that may arise when enroll...
Read Article →The new Defender for Endpoint unified agent is generally available for some time (since April 11th, 2022. The new unified Microsoft Defender for En...
Read Article →Last Updated on January 4, 2024 by Michael Morten Sonne Intoduction As part of its ongoing enhancements and… The post Retirement of supersede...
Read Article →Microsoft Defender for Business (MDB) is the new Defender product scoped for small businesses. Defender for Business is a new endpoint security sol...
Read Article →This blog will be, again about some nasty Store Apps issues!. In the conclusion of my last blog, I mentioned the fact that I was looking into some ...
Read Article →Today the threat researcher Filip Dragovic released a new PoC: DFSCoerce for us all to play with. I tested the PoC against a Microsoft Defender for...
Read Article →Last Updated on December 17, 2023 by Michael Morten Sonne Microsoft has announced a new feature for Microsoft… The post Microsoft Defender fo...
Read Article →Last Updated on January 6, 2024 by Michael Morten Sonne Internet Explorer is dead Microsoft confirmed today that… The post Microsoft: Windows...
Read Article →This blog will be about some weird issues with some Microsoft Store apps, such as when the device was wiped before being handed over to a new colle...
Read Article →This blog will be about me trying to explain why in my opinion it isn’t a big issue that the Microsoft Store for Business (MSfB) will be reti...
Read Article →This blog will show you how to get back your LOB (MSI) apps from Intune. Last week I noticed a question popping up on Reddit asking for the same th...
Read Article →Last Updated on April 13, 2025 by Michael Morten Sonne Microsoft Teams is packed with a lot… The post How to manage M365 portal directly from...
Read Article →This blog will show you an issue in which your lovely Windows Enterprise subscription license could be downgraded to Pro out of the blue. I decided...
Read Article →This blog will be about how I am protecting my Windows 10 Pro devices to ensure they aren’t vulnerable to the nasty CVE-2022-30190 bug, also known ...
Read Article →Automation is critical for modern SOC environments to handle the volume of upcoming threats and manage day-to-day tasks. Ideally most of the featur...
Read Article →Check out this article via web browser: Dynamic Administrative Units using on-prem Organizational Units Gone are the days that I could start a work...
Read Article →This blog will show you what could be causing the Enrollment status page to fail with a 0x80073cfb error when enrolling a Windows 11 Insider Previe...
Read Article →Check out this article via web browser: Get started with Azure AD B2B direct connect We all love seamless collaboration, right? Well, here’s ...
Read Article →This blog will show you what else could break when there are Authentication Issues at Microsoft. It was definitely something I wasn’t expecti...
Read Article →Note This article was last updated on 01/26/2025 for readability and changes to URLs.
Read Article →Currently in general availability is the new Security Settings Management in Microsoft Defender for Endpoint. Security Management for Microsoft Def...
Read Article →Check out this article via web browser: KB – Reset cross-tenant access policies back to the system default. This is a knowledgebase item. Hop...
Read Article →Note This article was last updated on 01/26/2025 for readability and updated URLs
Read Article →This week (16-05-2022 / 19-05-2022), was a week with many Autopilot issues. Some were caused by the broken latest Office 365 build, and some were c...
Read Article →Microsoft announced recently the new troubleshooting mode functionality for Defender for Endpoint. With the new troubleshooting mode, it is possibl...
Read Article →On Wednesday, May 25, 2022, I will be speaking together with Peter Daalmans at the Techorama Belgium event. Techorama 2022 will be an in-person con...
Read Article →This blog will be about some possible time-out issues you could encounter during the Account ESP phase when using Autopilot and requiring Online Mi...
Read Article →Note This article was last updated on 01/26/2025 for readability and updated URLs. Unfortunately, images were not able to be restored from a previo...
Read Article →Check out this article via web browser: Multi-stage approval for privileged roles using Azure AD Identity Governance Privileged Identity Management...
Read Article →Note This article was last updated on 01/26/2025 for readability and updated URLs. Unfortunately, images were not able to be restored from a previo...
Read Article →Note This article was last updated on 01/26/2025 for readability and updated URLs. Unfortunately, images were not able to be restored from a previo...
Read Article →In this blog, I will be talking about a sudden “HardwareMismatchDetected” I got when I was trying to enroll my Windows 10/11 device with Autopilot ...
Read Article →Microsoft Defender for Endpoint is an endpoint security platform designed to help customers prevent, detect, investigate, and respond to advanced t...
Read Article →Note This article was last updated on 01/26/2025 for readability and new images due to UI changes made in Intune. I tried to keep the original styl...
Read Article →On Friday, May 6th 2022, I will be speaking at the Microsoft 365 Virtual Marathon 2022 event. Microsoft 365 Virtual Marathon is a free, online, 60-...
Read Article →Credential dumping or password dump is a technique used by cybercriminals to gain access to a network. They will enter the workstation through phis...
Read Article →Check out this article via web browser: KB – mobile phone number not in sync Azure AD Connect This is a knowledgebase item. Hope it helps you...
Read Article →MFA prompt spamming/ MFA fatigue is a quite new term and seeing more after the LAPSUS$ attack. Currently there are many MFA options including SMS, ...
Read Article →This blog will discuss why your device could get an expected reboot during Windows Autopilot and also shows you how to fix it!
Read Article →Microsoft announced recently the public availability of the native response actions in Defender for Identity. Security teams can now directly impac...
Read Article →Check out this article via web browser: Download Intune PowerShell scripts with Graph Explorer This quick post will show an easy method to fetch yo...
Read Article →When deleting the Intune object, I noticed that Bitlocker had somehow been suspended. With Bitlocker suspended, the Protection was off. If the Bitl...
Read Article →This blog will show you the “other paths” available to ensure that your device is wiped before it is trashed or sent back to the supplier. 1. Intro...
Read Article →This blog will be about the error 0x81036501 we got during the MDM enrollment while enrolling a device with Autopilot white-glove AKA Pre-Provision...
Read Article →It’s been about 5 months since I last updated my comparison of Defender for Endpoint features by OS. This is a “matrix” of the to...
Read Article →This blog will show you an alternative method to download your Win32Apps sources from Intune WITHOUT having the Encryption key information. Besides...
Read Article →For many years, abuse of Remote Desktop Protection (RDP) has been the most common root cause of all ransomware events. At the moment one of the mos...
Read Article →Check out this article via web browser: 10 tips to secure your identities in Microsoft 365 I was recently invited by the Dutch Virtual Desktop User...
Read Article →This blog will discuss Microsoft's “their” solution to remove the lingering Windows.old folder after a remote wipe. I noticed that when using Micro...
Read Article →This time, I’m writing a simple and short blog about what options you have when you want to deploy your Office templates to your users. Again...
Read Article →Check out this article via web browser: Get started with multi-stage access reviews in Azure AD Access reviews, part of the Azure AD Identity Gover...
Read Article →I guess you have all been reading my blog series. Magical Mi…Ehh Wipe Series – Call4Cloud. It will show you some weird issues with the ...
Read Article →In this blog, I will try to explain the Technical flow behind the Push Button Reset. I was intrigued to do so after writing my blog about the linge...
Read Article →Microsoft Teams and other online collaboration tools increases massively in the last 2-3 years. Working from home became the new normal in most of ...
Read Article →This blog will be about some issues I encountered with Microsoft Teams notifications on especially IOS devices. I am writing this blog to make sure...
Read Article →This blogpost is a continuation of two earlier blogposts about integrating Apple Business Manager with Azure Active Directory and Apple Business Ma...
Read Article →The Microsoft Sentinel Data Connector that utilizes the modern agent (AMA) for collecting Windows Security Events is for a couple of months general...
Read Article →Check out this article via web browser: KB – SelfServicePasswordReset write-back problem – error hr=80230818 This is a knowledgebase it...
Read Article →Check out this article via web browser: ADMX ingestion for Centero Agent and Carillon Client using Intune This article is about the ADMX templates ...
Read Article →This blog will be about my experience performing a remote wipe of Windows 10 and 11 devices in Intune. I noticed some weird and awful behavior when...
Read Article →This article will continue where we finished in the article I wrote about setting up Apple Business Manager for use with Azure Active Directory. In...
Read Article →This blog will discuss the 0x800705b4 error that “could” occur during the “Preparing your device for mobile management” ESP Autopilot phase. ...
Read Article →Check out this article via web browser: Access reviews for Azure AD directory roles This blog post is for all those organizations out there with st...
Read Article →This blog will be about some stuff you need to beware of when you are setting up Azure AD Connect. It’s a topic I haven’t written a lot about but [...
Read Article →Apple Business Manager is a service provided by Apple which helps to deploy Apple devices and apps in your organization. By leveraging Apple Busine...
Read Article →In the last couple of months, there is a large increase visible in consent phishing emails (illicit consent attacks). Microsoft threat analysts are...
Read Article →This blog will explain why an existing Windows Business device isn’t automatically upgraded to Windows Enterprise after assigning the MS365 E5 lice...
Read Article →This blog will show you how to handle the issue where your device stops receiving updates due to the “Windows Updates Paused” setting, ...
Read Article →Introduction: Understanding and Utilizing Proactive Remediations in Intune Proactive remediations are a powerful feature in Microsoft Intune that e...
Read Article →Microsoft announced a new public preview which contains the new Microsoft Sentinel Health Monitoring feature. Microsoft Sentinel now provides the...
Read Article →Updating Applications can be a real headache, especially when certain apps require administrative permissions that standard users don’t have. This ...
Read Article →Today, I was called in to devise a solution to allow some DDS-CAD users (NO LOCAL ADMINS!) to install the necessary DDS-CAD updates themselves. Of ...
Read Article →This blog will be about Patch Tuesday and how to deal with those optional OOB (out-of-band) updates when you configure some nice Windows Update for...
Read Article →The use of device tags within Microsoft Defender for Endpoint (MDE) is important for environments. Device tags can be used to give more control ove...
Read Article →Check out this article via web browser: Microsoft 365 self-service using Power Apps This article was originally posted on the Microsoft 365 PnP Blo...
Read Article →Microsoft Defender for Endpoint deployment is possible based on multiple deployment mechanisms. Microsoft Defender for Cloud (previous Azure Defend...
Read Article →Check out this article via web browser: Act on group membership changes in Azure Active Directory Did you ever want to act on a change in group mem...
Read Article →Defender for Endpoint is available for multiple platforms. For mobile platforms Defender for Endpoint is supported for iOS en Android. In this blog...
Read Article →On Friday, January 14, 2022 I will be speaking at the M365 Chicago Virtual event. You can attend the event for free, by signing up via the Eventbri...
Read Article →I recently read through an excellent article by Mandiant, which recently split with FireEye, on their findings and analysis of the continued action...
Read Article →One of the most important and trending topics in the last couple of days is related to Log4j, log4shell, and the attached CVE 2021-44228. A zero-da...
Read Article →On Thursday, December 16, the Microsoft Cloud and Client Management Community (MC2MC) is organizing its December Evening event. The MC2MC team cons...
Read Article →Check out this article via web browser: Onboard FIDO2 keys using Temporary Access Pass in Azure AD One of the requirements to use FIDO2 security ke...
Read Article →Check out this article via web browser: Use Registration campaign to promote Microsoft Authenticator App With all the new improvements to the Micro...
Read Article →Microsoft has made available service release 2111 for Microsoft Endpoint Manager, this release contains a lot of updates which are described on the...
Read Article →During Ignite ’21 Microsoft announced multiple new functionalities, renames, and new products. In the upcoming weeks, more blogs are coming w...
Read Article →Today I experienced an issue which I want to share on my blog, it is related to a setting related to BitLocker which gets tattooed meaning that it ...
Read Article →Microsoft Sentinel is in the last months improved with a huge amount of new interesting features. One of the announced features is the content hub....
Read Article →During the Microsoft Ignite conference in November 2021 Microsoft made several announcements related to Azure AD conditional access. You can read t...
Read Article →Check out this article via web browser: The day I bought my WinRAR license This post is about WinRAR. We all know WinRAR for it’s never expir...
Read Article →On Saturday, October 30th I was a guest in the Cloud Conversations podcast which is hosted by Kat Greenan, Peter Rising and Ru Cambell. The Cloud C...
Read Article →On Saturday, November 20, the How to Manage Devices Community Group India, which is led by Microsoft MVP enterprise mobility Anoop C Nair organizes...
Read Article →Microsoft Defender for Endpoint contains multiple protections layers like EDR, ASR, Network Protection, and many more. Protecting against unwanted ...
Read Article →If you have Conditional Access configured and active within your Azure AD environment, there might be some scenario’s where users are not abl...
Read Article →While browsing through the options in my Conditional Access policies I noticed a new session related to Continuous Access Evaluation (CAE). Time fo...
Read Article →For next week, Thursday November 4th, we are proud to announce that we are hosting our first on-premised event again. The event will be held in the...
Read Article →On Friday, November 12th Professional Development Services is organizing its annual event AppManagEvent again. This in-person full day event which ...
Read Article →Check out this article via web browser: Enable Location Information and Code Match for Azure MFA Update 26-11-2021 As this feature is now in public...
Read Article →Check out this article via web browser: Create Role Assignable Groups based on existing groups Today’s post is about Role Assignable Groups. ...
Read Article →Web content filtering is part of the Microsoft Defender for Endpoint solution. One of the previous blogs explained the feature during the preview r...
Read Article →Check out this article via web browser: 10 productivity tips for M365 administrators I have worked with Microsoft 365 over the past few years, and ...
Read Article →For next week, Tuesday, October 26 we are proud to announce that we have a special edition of our #WPNinjasNL Tuesdays Webinar. This time, Isidora ...
Read Article →In July, I released v1 of The Big Comparison of Defender for Endpoint Features by Operating System (or, what I think is much catchier, TBCMDEFOS). ...
Read Article →I’m proud to announce the October 2021 update of my Conditional Access demystified whitepaper. With this release, we have reached the fourth ...
Read Article →Since April 11th, 2022, the new unified Microsoft Defender for Endpoint solution is generally available for Server 2016 and Server 2016. The unifie...
Read Article →On Wednesday October 13, I will be speaking at the free online webinar hosted by Centric Craft. Craft is a community initiative from the company Ce...
Read Article →In December last year, Microsoft announced that per April 1, 2021 they updated their service level agreement(SLA) for Azure AD user authentication ...
Read Article →Check out this article via web browser: Customize the MFA registration policy in Azure AD Identity Protection Disclaimer: this is a proof of concep...
Read Article →Cloud App Discovery is one of the most interesting functions available in Microsoft Cloud App Security. This blogpost is about the new MCAS monitor...
Read Article →Tomorrow, on October 5th Microsoft will make Windows 11 Generally Available. Many of my customers already asked if this will have any impact on the...
Read Article →Check out this article via web browser: KB – Add account operation is blocked by policy on the device This is a knowledgebase item. Hope it h...
Read Article →Starting with Firefox version 91, Mozilla is now supporting Single sign-on support (SSO) and device-based Conditional Access as announced by Micros...
Read Article →Check out this article via web browser: Role Assignable Groups and Privileged Identity Management. I have used this feature from the very beginning...
Read Article →Microsoft recently added a new function that gives the option for stream events from Azure AD Identity Protection into Microsoft Sentinel. In this ...
Read Article →The last couple of years, Microsoft has been pushing the usage of Multi Factor Authentication for logins to their Cloud Services. MFA, which requir...
Read Article →Cloud discovery is one of the most interesting functions available with the Cloud App Discovery product. With Cloud Discovery, organizations will g...
Read Article →Today I experienced an interesting issue, for which I thought it was interesting sharing how I figured out what was going on. The issue/challenge T...
Read Article →Check out this article via web browser: This might be the FIDO2 key for you! Authentrend ATKey.Pro In the past few years, I tried different types o...
Read Article →Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sens...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 1 Part 1 – Introduction an...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 2 Part 2: App registration and G...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 3 Part 3: Graph API and Graph Explorer...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 4 Part 4: Build a custom connector bas...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 5 Part 5: Create an app in PowerApps u...
Read Article →Welcome to the fifth blog post in the series becoming a Kusto Knight. While the previous blog post was about time in Kusto, this blog post will be ...
Read Article →Check out this article via web browser: (Bonus) How to build a PowerApp – Temporary Access Pass Manager – Part 6 (Bonus) Part 6: Integr...
Read Article →A Password Spraying Attack is a type of brute force attack where a malicious actor attempts the same password on many accounts before moving on to ...
Read Article →It has been busy times, and I have not written much lately. So, I have had some time to think about new detections. And while there are enough blog...
Read Article →The basics Let’s start this article with some basic cybersecurity terminology. Security hygiene, or cyber hygiene, is a general term used to ...
Read Article →System Monitor (Sysmon) is one of the most common add-ons for Windows logging. With Sysmon, you can detect malicious activity by tracking code beha...
Read Article →From Tuesday August 31 till Thursday September 2, the 2nd edition of the Workplace Ninja Virtual Edition will take place. The event will be hosted ...
Read Article →Live response is a function from Defender for Endpoint and is available for Windows 10 and Server 1803/1903. Live response gives security operation...
Read Article →Azure AD Identity Protection is one of the security tools available in the Microsoft E5 license. With Azure AD Identity Protection it is possible t...
Read Article →Microsoft Defender for Endpoint (MDE) is a massive platform. It’s not a single product, and it’s more than just a service. It’s a...
Read Article →Microsoft announced on 14th June 2021 a new version of the Windows Security Events data connector. The new feature reached currently the public pre...
Read Article →Our # WPNinjasNL “Live – Ask us Anything” session planned for Tuesday June 29 has been rescheduled to Monday July 5th, you can st...
Read Article →Check out this article via web browser: Getting everyone enrolled for Azure MFA and SSPR. How hard can it be? I’ve done quite some Azure MFA ...
Read Article →On Wednesday June 30, I spoke at the monthly user group meeting of the Microsoft 365 Security & Compliance user group. The Microsoft 365 Securi...
Read Article →Technical details and a proof-of-concept (PoC) exploit have been accidentally leaked for a currently unpatched vulnerability in Windows that makes ...
Read Article →This will be a brief blog, as I am certainly not a DHCP expert or day-to-day administrator. I do, however, run a DHCP server on Windows Server 2019...
Read Article →During Microsoft Ignite in March this year, Microsoft announced several new upcoming functionalities for Azure Active Directory. One of the announc...
Read Article →Since the last years, there is a large increase in cybercriminals attempting to run attacks by exploiting the login credentials. With the current w...
Read Article →For Tuesday, June 22 (yes, thats Tomorrow) we are proud to announce that our very own Peter Daalmans, Microsoft MVP Enterprise Mobility will host a...
Read Article →A new feature in public preview is the Azure AD access review functionality. With the new AzureAD access reviews function it is possible to review ...
Read Article →Check out this article via web browser: Change billing model for Azure AD guest users Back in 2020, Microsoft announced a change in the pricing mod...
Read Article →Check out this article via web browser: Power Automate: not your daddy’s RSS reader Here’s a quick tip for all you eager learners out t...
Read Article →Office 365, or Microsoft 365 Apps for Enterprise, or whatever it’s called this month, can be deployed by Intune to Windows 10 devices using a...
Read Article →Conditional Access configuration for AzureAD accounts is important. With Conditional Access you can protect easy accounts, block outdated protocols...
Read Article →In my last blog, I wrote about three considerations for your Azure Information Protection deployments and commented on often overlooked potential d...
Read Article →On Wednesday June 30, I will be speaking at the monthly user group meeting of the Microsoft 365 Security & Compliance user group. The Microsoft...
Read Article →By default Microsoft Defender for Endpoint stores Endpoint events in Defender for Endpoint for the configured retention period; Max: 180 days. ...
Read Article →For next week, Tuesday, June 8th we are proud to announce that Thorsten Pickhan, Senior Microsoft UC Consultant and Michael Plettner, Microsoft MVP...
Read Article →On Thursday June 1st 2021, I received an email from Microsoft telling me that I received the Microsoft Most Valuable Professional (MVP) award. My a...
Read Article →The Flubot-malware is currently active in the news. The malware with the name FluBot will be sent to mobile endpoints with a text message or WhatsA...
Read Article →Microsoft recently announced a new existing feature in Microsoft Endpoint Manager with the name: “filters”. With the new feature, it is...
Read Article →Yesterday, on Thursday May 27, Erik Loef and I delivered a session at the May virtual event of the Microsoft Cloud and Client Management Community....
Read Article →Earlier this month I wrote an article about using filtering in assignments for apps, compliance policies and configuration profiles in Microsoft En...
Read Article →The goal of this blogpost is to explain more about what happens between the moment that a configurations setting in Microsoft Endpoint Manager (MEM...
Read Article →For next week, Tuesday, May 25 we are proud to announce that Jan Bakker, Microsoft 365 Consultant and Microsoft Enterprise Mobility MVP will be hos...
Read Article →Working from home became the new normal in most of the work environments. With the increase of working from home also the security impact changed. ...
Read Article →On Tuesday, May 18 we are proud to announce our fifth “Live – Ask us Anything” session, hosted by Ronny de Jong and Frans O...
Read Article →Azure Information Protection (AIP) – more accurately exposed to Microsoft 365 now as sensitivity labels – is close to the top of my fav...
Read Article →During Microsoft Ignite, Microsoft announced the option to bypass pre-configured Windows Update for Business policies to immediately deploy a secur...
Read Article →Microsoft is currently in the process of rolling out a preview of filtering for apps, policies and profiles in Microsoft Endpoint Manager. With thi...
Read Article →Azure Security Center included integration with Azure Workbooks. With the new Workbooks feature is it possible to build custom reports. From Azure ...
Read Article →On Thursday May 27, Erik Loef and I will speak at the May virtual event of the Microsoft Cloud and Client Management Community. The Microsoft Cloud...
Read Article →For next week, Tuesday, May 11 we are proud to announce that Nico Zieck, Director Technology & Solutions at Liquit B.V. will be hosting a sessi...
Read Article →The Azure Mask browser extension is a really great tool when either recording on-screen demos or sharing your screen. Available for Edge/Chrome and...
Read Article →Unmanaged devices are most of the time a weak point in the corporate network/ environment. With the current situation more and more BYOD devices ar...
Read Article →The Microsoft Company Portal app is a cross platform app available in the app stores of Apple, Android and Microsoft. The app, depending on the ins...
Read Article →Welcome to the fourth blog post in the series becoming a Kusto Knight. While the previous blog post was about data types in Kusto, this blog post w...
Read Article →As I have blogged about a lot, there are a bunch of hoops to be jumped through and prerequisites to be met for a successful hybrid Azure AD join an...
Read Article →On Tuesday, April 20 we are proud to announce our fourth “Live – Ask us Anything” session, hosted by Ronny de Jong and Fran...
Read Article →This month Microsoft released a new “User Action” for Conditional Access in public preview. The new user action called “Register ...
Read Article →Most of us have had that “oh <blank>” moment where we have given someone access to someone only to immediately or later need to...
Read Article →Measuring your managed systems against a baseline has been around for a while, in Microsoft Endpoint Configuration Manager(MECM)/ConfigMgr we can a...
Read Article →For next week, Tuesday, April 13 we are proud to announce that Greg Ramsey, Enterprise Mobility MVP and Enterprise Tools Strategist at Dell, Inc. w...
Read Article →Check out this article via web browser: Require MFA for Azure AD domain join and Device Registration Today we take a look at a new feature in Azure...
Read Article →A common Conditional Access policy is to add trusted locations as an exception to multi-factor authorisation requirements. The logic goes, if you a...
Read Article →Keeping Microsoft windows devices up-to-date has been a challenge I have been dealing with for a long time now. Within Microsoft Endpoint Configura...
Read Article →Het bericht Defender for Endpoint on Linux onboarding and behavior monitoring detection verscheen eerst op Jeffrey Appel - Microsoft Security blog.
Read Article →For next week, Tuesday, March 30 we are proud to announce that Dirk-jan Mollema, one of the core researchers of Active Directory and Azure AD at Fo...
Read Article →Starting in January 2021, the Workplace Ninja User Group Netherlands has started a new initiative, the “Live – Asks us Anything” ...
Read Article →BitLocker unique identifiers are values used to identify the ownership of an encrypted volume. The device that performs the encryption holds the un...
Read Article →Check out this article via web browser: Azure Active Directory Connect – Cloud Sync When organizations want to extend Active Directory to Azu...
Read Article →On Friday, the 19th of March, I spoke at the 2103 virtual meetup of the Workplace Ninja User Group Switzerland. During this event which lasts a who...
Read Article →One of the main Identity related topics during Microsoft Ignite March 2021 edition was passwordless. Microsoft announced at the event that password...
Read Article →Legacy authentication is the most compromising sign-in. Microsoft is going to disable basic/ legacy authentication. It is recommended to impl...
Read Article →Although not common, there are scenarios out where you will have LAN-only devices onboarded in Microsoft Defender for Endpoint (MDE), or at least u...
Read Article →Microsoft has rolled out a new feature in Exchange Online called External Sender Identification. It allows for tags to be added to email messages c...
Read Article →Update: Since September 2022, the v3.0 PowerShell module of Exchange Online is available, which when used solves this issue as well. You can update...
Read Article →The Microsoft 365 Apps admin center, available via https://config.office.com provides a portal where admins can manage Microsoft 365 Apps for Enter...
Read Article →For next week, Tuesday, March 16 we are proud to announce that Patrick van den Born and Rick Stijnman will be hosting a session about: Deploying Wi...
Read Article →As part of the new Passwordless GA announcement, Microsoft created a new activity blade in AzureAD. With the new Authentications methods Activity b...
Read Article →When configuring Defender for Endpoint (MDE) customer recently, I ran into a problem when trying to enable network protection. Network protection i...
Read Article →Check out this article via web browser: Review guest access across Microsoft 365 groups (teams) In a previous blog post I wrote about Azure AD Acce...
Read Article →This week, during the virtual Ignite event Microsoft made several announcements related to the Modern Workplace. The event started yesterday (March...
Read Article →Microsoft has detected multiple 0-days exploits being used to attack on-premises versions of Microsoft Exchange Servers. Microsoft releases today m...
Read Article →A well-running workplace environment is critical to have a great endpoint user-experience. With a not stable configuration/ device the productivity...
Read Article →On Friday, the 19th of March, I will speak at the 2103 virtual meetup of the Workplace Ninja User Group Switzerland. During this event which lasts ...
Read Article →With Microsoft Information Protection, you can apply sensitivity labels to files, emails, and containers such as SharePoint Libraries. These labels...
Read Article →For next week, Tuesday, February 16 we are proud to announce that Thomas Maurer, Senior Cloud Advocate at Microsoft will be hosting a session about...
Read Article →Check out this article via web browser: Azure Active Directory Temporary Access Pass This blog post is all about the new Temporary Access Pass in A...
Read Article →With the 2101 Service Release of Microsoft Intune, released this week (February 1, 2021) Microsoft released a lot of new features. One of those fea...
Read Article →Getting your devices into Defender for Endpoint is referred to as onboarding and can be done in lots of different ways, depending on the scenario. ...
Read Article →Yesterday, on Thursday February 16, I presented at the 19th Workplace Ninja User Group Netherlands Tuesdays Webinar. My session, titled “Azur...
Read Article →I’m proud to announce the February 2021 update of my Conditional Access demystified whitepaper. With this release, we have reached the third ...
Read Article →The new Azure AD Temporary Access Pass preview feature is available in the tenant. With the new preview feature, it is possible to configure ...
Read Article →Check out this article via web browser: Privileged Identity Management Discovery and insights Privileged Identity Management (PIM) in Azure Active ...
Read Article →Today, on Thursday February 11, I presented for at the second day of the Nordic Virtual Summit 2021 event. The event was very well organized by sev...
Read Article →In Microsoft Defender for Endpoint (MDE), tags can be attached to a device for reporting, filtering, and as a dynamic attribute for membership of a...
Read Article →In January, Microsoft announced that they released a public preview allowing entitled customers to create Azure AD access reviews for guest users a...
Read Article →Check out this article via web browser: Number matching with Microsoft Authenticator App in Azure MFA Number matching and passwordless phone sign-i...
Read Article →Check out this article via web browser: One year anniversary JanBakker.tech This month, janbakker.tech becomes one year old. On February 16th 2020,...
Read Article →Check out this article via web browser: Speaking at Global Automation Bootcamp 2021 I’m very excited to announce my session for the Global Au...
Read Article →To provision Windows 10 PCs using Autopilot and Intune, they must first be registered as Windows Autopilot devices in the Device Directory Service,...
Read Article →On February 2, 2021 Microsoft announced “Windows 10 in cloud configuration”, when reading the title I was immediately interested to fin...
Read Article →With the 2101 Service Release of Microsoft Intune, released this week (February 1, 2021) Microsoft released a lot of new features (more on that in ...
Read Article →Welcome to the third blog post in the series becoming a Kusto Knight. While the previous blog post was about where we store data in Kusto, this blo...
Read Article →Welcome to the Kusto Gym, On your road to become a Kusto Knight, there are some exercises to put the theory into action. Where do we store the data...
Read Article →On Tuesday the 16th of February, I will speak at the webinar of the Workplace Ninja User Group Netherlands. This session, which is updated monthly ...
Read Article →Welcome to the second blog post in the series becoming a Kusto Knight. While the previous blog post was more about what Kusto Query Language is, an...
Read Article →Application Guard first appeared in Windows 10 1709 (“Fall Creators Update”) to isolate Edge browser activity within a Hyper V containe...
Read Article →On Wednesday 10 and Thursday 11 February, several communities (A joint venture by #SGUCSE #SCUGDK #SCUGFI #MMUGNO and #MSEndpointMgr) in the Nordic...
Read Article →For Tuesday, February 2nd we are proud to announce that community friend Kenny Buntinx & Merlijn Van Waeyenberghe are hosting a session about: ...
Read Article →This article is about a subject I covered before in my blogpost titled: “Understanding and governing reauthentication settings in Azure Activ...
Read Article →On modern workplaces we use authentication techniques provided by Windows Hello for Business, like biometric and PIN. Due to this, user don’t...
Read Article →Since October 2019, Microsoft has enabled Security Defaults by default in new Microsoft 365 tenants. Security Defaults are a group of best-practice...
Read Article →Starting in January 2021, the Workplace Ninja User Group Netherlands has started a new initiative, the “Live – Asks us Anything” ...
Read Article →Yesterday, on Thursday January 21, I presented for the Workplace Ninja User Group München about one of my favorite topics “Conditional Access...
Read Article →For Today, January 19th we are proud to announce that our own Adnan Hendricks, Microsoft Azure MVP will host a session about: Azure AD Identity Pro...
Read Article →Azure AD access reviews feature is now in public preview for the Teams and Microsoft 365 Groups. In this blog post an overview of the new public pr...
Read Article →Check out this article via web browser: Self Service in Microsoft 365 One of the great things about Azure Active Directory is the capability of sel...
Read Article →As you move from on-premises or third-party infrastructure to Microsoft 365 and Azure AD, you will want to keep those BitLocker recovery keys safe....
Read Article →Check out this article via web browser: Enrich Microsoft 365 profile card with extensions and custom attributes Microsoft 365 is equipped with a ve...
Read Article →Welcome to the first blog post in the series becoming a Kusto Knight. Besides blogging about the latest and greatest detections I also want to help...
Read Article →On Thursday, January 21st 2021 I’m honored to announce that I will be speaking at the Workplace Ninja Usergroup München meetup. The Workplace...
Read Article →In February 2013 Bob Cornelissen, Marnix Wolf, Peter Daalmans and myself founded the Windows Management User Group Netherlands (WMUG_NL) foundation...
Read Article →Check out this article via web browser: Azure Active Directory Identity Governance – Azure AD Entitlement Management In this series, we take a look...
Read Article →SolarWinds has revealed how monitoring products it released earlier this year may have been tampered with in a supply chain attack. In this blog po...
Read Article →Check out this article via web browser: Azure Active Directory Identity Governance – Privileged Identity Management In this series, we take a look ...
Read Article →Het bericht Deploy and configure Microsoft Defender for Endpoint on iOS devices verscheen eerst op Jeffrey Appel - Microsoft Security blog.
Read Article →In June this year I wrote an article about: Limit Access to Outlook Web Access, SharePoint Online and OneDrive using Conditional Access App Enforce...
Read Article →In my work as a modern workplace consultant, I see a lot of Microsoft Endpoint Manager/Intune environments. Many of these environments have been bu...
Read Article →For Tuesday, December 1 we are proud to announce that Alex Verboon, Cyber Security Consultant at baseVISION in Switzerland will host a session abou...
Read Article →Check out this article via web browser: Azure Active Directory Identity Governance – Access Reviews In this series, we take a look at Azure A...
Read Article →In August last year, I published eight articles in a series on Conditional Access, and later once finished I decided to bundle those articles in a ...
Read Article →Managing the risks around data has become increasingly complex for organizations. At the current stage more and more employees are working from hom...
Read Article →Conditional Access is one of the available tools used by Azure Active Directory to bring different signals together. Based on different signals it ...
Read Article →For Tuesday, November 10 we are proud to announce that Ronni Pedersen, Cloud Architect at APENTO will host a session about: “How to get succe...
Read Article →Check out this article via web browser: Protect files on download using Cloud App Security and Azure Information Protection If you have read my blo...
Read Article →In the name of transparency, or maybe stating the bleeding obvious, I confess I am that guy who can happily read an IT reference book or something ...
Read Article →Today I’m sharing a useful bit of PowerShell I gracelessly punt from script to script whenever I need to make sure a prerequisite it met befo...
Read Article →Continuous Access Evaluation (CAE) for AzureAD is one of the latest functions and is available in public preview. With this new technique, it is po...
Read Article →Governing when users receive authentication prompts when authenticating to Azure Active Directory (Azure AD) is depending on more than one setting,...
Read Article →For Tuesday, October 27th we are proud to announce that Erik Loef, CTO and Microsoft MVP at Proxsys, and Kenneth van Surksum, Modern Workplace cons...
Read Article →Microsoft Defender for Office 365 is one of the three types of Advanced Threat Protection that Microsoft offers. With Microsoft Defender for Office...
Read Article →Check out this article via web browser: License on-demand with Power Automate and Azure AD Most organizations are using group-based licensing in Az...
Read Article →One of the benefits of Microsoft 365/ Microsoft Endpoint is the interaction across all the different products. With the connection between multiple...
Read Article →With Microsoft Intune, there is a lot of focus on the Mobile Device Management (MDM) aspects of the product. This is logical because from a managem...
Read Article →In April 2020 Alex Weinert, Director of Identity Security at Microsoft announced that Microsoft was working on moving towards real time policy and ...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Azure Sentinel is a cloud-native security information and event management platform. (SIEM). Sentinel uses AI to analyze large volumes of data. Azu...
Read Article →In December 2019 Microsoft included support for Plus Addressing in their roadmap (ID 59441) for Office 365. In the meantime this feature is release...
Read Article →Check out this article via web browser: Food for thought – Bring Your Own Disaster. Today a slightly different blog post. It’s a common...
Read Article →Databeveiliging en classificatie is belangrijk. Een datalek via een verkeerde aanzender of toegang tot externe databronnen is snel gemaakt, waardoo...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Check out this article via web browser: Block outdated operating systems with Cloud App Security It is not unlikely that some of your users still u...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Azure Sentinel is een cloud-native Security Information Event Management-oplossing, ook wel bekend als een SIEM-oplossing. Azure Sentinel is cloud-...
Read Article →Check out this article via web browser: Azure MFA authentication method analysis. Share the results with Power Automate! You might have seen the sa...
Read Article →Microsoft Cloud App Security (MCAS), Redmond’s cloud app security broker (CASB) offering, is a powerful tool for investigating and pro-active...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 15 – Do not expire passwords Research has found that when periodic password...
Read Article →Check out this article via web browser: Control access from unmanaged devices with Cloud App Security When COVID-19 hit the world, most people had ...
Read Article →Microsoft 365 changes regularly, changes are implemented almost on a daily basis and as an Admin responsible for the service you must be aware of w...
Read Article →If your goal is to restrict the usage of Office applications on non-managed devices and only allow Web access in limited mode (as explained in my a...
Read Article →In February this year I blogged about Stopping automatic email forwarding in your Exchange Online environment in a controlled way providing a struc...
Read Article →On August 13th 2020, Alex Simons (Microsoft Identity PM) announced that assigning groups to Azure AD roles in now in public preview. This feature i...
Read Article →Check out this article via web browser: Use Microsoft Graph Security for end-user notifications In this short blog post, I want to show how you can...
Read Article →Microsoft Cloud App Security is geplaatst als Cloud App Security broker in het landschap van Microsoft en heeft meerdere mogelijkheden welke aanslu...
Read Article →In October 2019, Microsoft announced that it would enable end users to buy and manage their own licenses within their corporate account. At that ti...
Read Article →This blog is the last in a small series on Azure AD Premium P2’s Identity Governance toolkit. Part 1: Entitlement Management Part 2: Access R...
Read Article →In my deep dive article on Office 365 Advanced Threat Protection (ATP) I mentioned that Microsoft provides best practices as described in the follo...
Read Article →Check out this article via web browser: Bulk dismiss risky users with Power Automate or Logic Apps Update 08-10-2020: Microsoft released an officia...
Read Article →This blog is the second in a small series on Azure AD Premium P2’s Identity Governance toolkit. Part 1: Entitlement Management Part 2: Access...
Read Article →Check out this article via web browser: Prepopulate phone methods for MFA and SSPR using Graph API Part 1 – Graph API What is the number one ...
Read Article →Check out this article via web browser: Prepopulate phone methods using a Custom Connector in Power Automate Part 2 – Automation In the previ...
Read Article →This blog is the first in a small series on Azure AD Premium P2’s Identity Governance toolkit. Part 1: Entitlement Management (this post) Par...
Read Article →Check out this article via web browser: Close the gap. Azure AD Identity Protection & Conditional Access. This blog is about Azure AD Identity...
Read Article →Microsoft Cloud App Security is een behoorlijk uitgebreid product met verschillende mogelijkheden en toepassingen. In een eerder blog was al te lez...
Read Article →Microsoft Defender ATP is de Advanced Threat Protection dienst van Microsoft. Bij Microsoft gaan de ontwikkelingen snel, waarmee er steeds meer fun...
Read Article →Microsoft Defender ATP is al een tijd als preview te vinden in Microsoft Defender ATP – sinds 6 juli is hierop een wijziging geweest vanuit M...
Read Article →De nieuwe Microsoft Edge webbrowser is gebaseerd op Chromium en geeft verschillende voordelen welke voor de beheerders interessant zijn. Door de on...
Read Article →In my last blog, I wrote about web content filtering in MDATP and how it now allows you to block website categories on the client across all apps. ...
Read Article →Check out this article via web browser: Use Power Automate as your Conditional Access Police Department Last week, I was working on a new blog for ...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 14 – Designate more than one global admin Designate more than one global ad...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 13 – Set automated notifications for new and trending cloud applications in...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Sinds de coronasituatie is Teams in een versnelling gekomen bij de meeste organisaties. In de meeste gevallen een versnelde uitrol, waardoor er nie...
Read Article →Historically, one of the big features missing “out of the box” with MDATP was web content filtering. Customers typically look at MDATP ...
Read Article →Check out this article via web browser: Use Power Automate or Logic Apps to keep an eye on your licenses I guess we’ve all been there; you ra...
Read Article →One of the scenario’s we can build with Conditional Access, is the scenario where we restrict access inside the web application itself. By do...
Read Article →Microsoft heeft sinds deze week Microsoft Defender Advanced Threat Protection voor mobiele devices in public preview fase uitgebracht. Met deze rel...
Read Article →After earning my Microsoft 365 Certified Enterprise Administrator Expert certification in May, I decided to continue my certification journey and e...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Check out this article via web browser: A first look at Administrative Units and My Staff in Azure Active Directory Recently, Microsoft introduced ...
Read Article →Met de komst van multifactor en moderne authenticatie stappen steeds meer bedrijven over op de Outlook app voor de mobiele devices. Dit heeft voora...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 12 – Turn on customer lockbox feature Turning on the customer lockbox featu...
Read Article →Met de aflopende support van Android device administrator is het van groot belang om te zoeken naar een passend alternatief. Vanuit Microsoft Endpo...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 11 – Turn on user risk policy With the user risk policy turned on, Azure AD...
Read Article →Tegenwoordig worden steeds meer applicaties via de cloud aangesloten en geconfigureerd. Als we naar Microsoft kijken, is het mogelijk om vele appli...
Read Article →External Identities is a new public preview feature of Azure AD which allows external users to authenticate with a non-Microsoft account such as th...
Read Article →Edge Chromium is de nieuwe versie van Edge welke is gebaseerd op de opensource Chromium. Vanuit Microsoft Endpoint Manager is het mogelijk om deze ...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 10 – Discover trends in shadow IT application usage Add a data source in au...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Check out this article via web browser: Set additional clocks to Windows 10 using Intune When you work for an international company, or you have to...
Read Article →There are currently three separate admin consoles in Microsoft 365 for administrators to view or configure security and compliance policies, alerts...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 09 – Do not allow users to grant consent to unmanaged applications Tighten ...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Microsoft heeft laten weten dat het Legacy Authentication protocol in de 2e helft van 2021 geblokkeerd zal worden. Om de security te verbeteren is ...
Read Article →I’m a simple person, and sometimes it just helps to have a checklist to refer to when you’re troubleshooting rather than navigating the...
Read Article →In August last year, I published eight articles in a series on Conditional Access, and later when finished I decided to bundle those articles in a ...
Read Article →Check out this article via web browser: Install Windows Package Manager (winget) using Intune Microsoft released a preview of the Windows Package M...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Update October 7 2020: This functionality is now GA, see Publisher verification and app consent policies are now generally available In February th...
Read Article →Check out this article via web browser: Sure, keep me signed in! And don’t prompt for MFA! Today a short blog about MFA prompts, session life...
Read Article →Build 2020 had some nice bits of M365 related news. Microsoft deserves commendation for sticking to the schedule and pulling this off (remotely) du...
Read Article →De cloud is trending en steeds meer applicaties en diensten zijn afhankelijk van de cloud. Een cloud omgeving geeft vele voordelen maar geeft ook e...
Read Article →Een wachtwoord is als je er over nadenkt best lastig, en je vergeet hem vast wel eens. Ook heeft een gebruiker tegenwoordig meerdere accounts – en ...
Read Article →Microsoft heeft vandaag laten weten dat de Intune support voor “Android Enterprise fully managed devices” nu volledig beschikbaar is. Hiermee is he...
Read Article →Azure AD Password Protection is een functionaliteit welke de mogelijkheid geeft om het wachtwoordbeleid te versterken op basis van informatie welke...
Read Article →Een wachtwoord is als je er over nadenkt best lastig, en je vergeet hem vast wel eens. Ook heeft een gebruiker tegenwoordig meerdere accounts – en ...
Read Article →De Azure AD beveiligen is tegenwoordig van groot belang. Vanuit de Microsoft Secure Score krijg je een aantal adviezen op basis van de kennis bij M...
Read Article →Azure Sentinel is een van de nieuwste security producten van Microsoft. Maar wat is nu precies het doel van Azure Sentinel binnen de Microsoft omge...
Read Article →Yesterday I completed the last exam in order to earn the Microsoft 365 Certified Enterprise Administrator Expert certification. Microsoft 365 Enter...
Read Article →Een verzoek hoog op de wensenlijst van vele beheerders. De mogelijkheid om de self-service acties te wijzigen in de Company Portal. In de praktijk ...
Read Article →Wachtwoorden zijn momenteel nog de meest gebruikte mogelijkheid voor het inloggen. Een groot deel van de online accounts bevat vooralsnog een wacht...
Read Article →Teams is enorm populair, en is wereldwijd in een behoorlijke versnelling gekomen vanwege het vele thuiswerken. Microsoft Teams is een online samenw...
Read Article →Steeds meer bedrijven maken de overstap richting de cloud. Uiteraard zijn de cloud functionaliteiten enorm, toch zijn bedrijven terughoudend vanweg...
Read Article →The group policy object Register domain-joined computers as devices, or Automatically workplace join client computers in older templates, was previ...
Read Article →Check out this article via web browser: Going passwordless with the FEITIAN Fingerprint card A quick word upfront. I'm not a salesperson. I'm inter...
Read Article →A Windows 10 user can self-enrol in MDM or MAM from Settings > Accounts > Access work or school > Connect. What happens next depends on...
Read Article →One of things that strikes me as vague in Windows Information Protection (WIP) policies in Intune is configuring targeted apps: what’s the ex...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Check out this article via web browser: Use Graph API data in Power BI using Logic Apps Some things in the modern connected world seem so common th...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →I’m very proud to announce that I will be speaking at the Workplace Ninja Virtual Edition 2020 event. The Workplace Ninja Virtual Edition 202...
Read Article →Check out this article via web browser: What admins should know about the combined registration portal for Azure MFA and Self Service Password Rese...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 08 – Use Cloud App Security to detect anomalous behavior Cloud App Security...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events. We started thi...
Read Article →Around 5 years ago (April 2015) Microsoft announced Exchange Online Advanced Threat Protection (ATP), which was renamed to Office 365 Advanced Thre...
Read Article →Check out this article via web browser: How to keep an eye on your Teams with Log Analytics and Azure Monitor? In my previous blog post, I wrote ab...
Read Article →Check out this article via web browser: Activity policy templates for Teams in Microsoft Cloud App Security The usage of Teams is massively increas...
Read Article →Due to the current COVID-19 crisis, we were forced to postpone our in- person meetings for our Windows Management User Group Netherlands community....
Read Article →Check out this article via web browser: Manage Teams custom backgrounds using Intune Update! I got some feedback on this blog. Seems that if your u...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 07 – Turn on sign-in risk policy Turning on the sign-in risk policy ensures...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 06 – Enable policy to block legacy authentication Today, most compromising ...
Read Article →One of the advantages of Microsoft having many customers using its services is that Microsoft can leverage data from those customers and apply some...
Read Article →Check out this article via web browser: Use Power Automate for your custom “dynamic” groups Azure AD Dynamic Groups Dynamic groups in A...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 05 – Enable self-service password reset With self-service password reset in...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 04 – Ensure all users can complete multi-factor authentication for secure a...
Read Article →Lessons learned while implementing Azure AD Privileged Identity Management (PIM) The post Lessons learned while implementing Azure AD Privileged Id...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 03 – Enable Password Hash Sync if hybrid Password hash synchronization is o...
Read Article →Check out this article via web browser: How to publish on-premises applications and protect them with MFA Using Azure Application Proxy you can pub...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 02 – Require MFA for administrative roles Require MFA for administrative ro...
Read Article →On Saturday March 28th, 2020 the Windows Management User Group Netherlands (WMUG_NL) will organize a full Saturday with Workshops. Together with Pe...
Read Article →On Wednesday April 1st, I have the opportunity to present at the RDW Techday. RDW Techday is a community event organized by the RDW, the goal is to...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 01 – What is Microsoft Secure Score? What is Microsoft Secure S...
Read Article →Microsoft licensing is tough and vague but something we must deal with while implementing our solutions. I’m also aware that some of the feat...
Read Article →Update: On September 23, 2021, the Exchange Team announced that effective October 1st, 2022 basic authentication, regardless of usage will be perma...
Read Article →Check out this article via web browser: Azure AD tenant branding; size does matter! Earlier today, I read this article from Alex Simons about the c...
Read Article →At our last Windows Management User Group Netherlands meeting, we had the honor to have Sami Laiho, one of the world’s leading professionals in the...
Read Article →Check out this article via web browser: Get started with web content filtering in MDATP Update 7-7-2020: Microsoft anounced that you no longer need...
Read Article →Check out this article via web browser: Require trusted location for MFA and SSPR registration This article shows how you can block MFA and SSPR re...
Read Article →Check out this article via web browser: Windows Update for Business. “Just” a free cloud service. Since the introduction of the “...
Read Article →Working as a modern workplace consultant also means that sometimes you have to go deep into Exchange Online options in order to make sure that (sen...
Read Article →Check out this article via web browser: Secure your Azure Management portal Today a quick tip to secure your Azure Management Portal. By default, t...
Read Article →By default, on Windows 10 devices which are Azure AD joined, the user performing the join is added to the Local Administrator group. Besides the us...
Read Article →As you may know, it’s possible for your users to sign-in to SaaS based applications using their Azure AD account. By doing this, a Single Sig...
Read Article →Unified labels refer to a movement whereby Azure Information Protection (AIP) labels are now being replaced by sensitivity labels. Sensitivity labe...
Read Article →Microsoft has quietly introduced the option to automatically block connections to unsanctioned cloud apps from the Microsoft Cloud App Security (MC...
Read Article →Last week, Microsoft announced that the Azure AD conditional access baseline policies will not make it out of their current preview status. The fun...
Read Article →Intune provides an interface to easily deploy apps from the Microsoft Store to your registered users and devices, but even if you have SCCM (Config...
Read Article →Deploying Outlook add-ins (“apps”) for your O365 tenant is an intuitive experience via AppSource. As a Global Administrator, click GET ...
Read Article →When you create an Intune tenant within your environment, you execute the creation with an account which is Global Administrator within Azure Activ...
Read Article →When you host your email on the Exchange Online (EXO) platform part of Office365 you can implement several security measures to make sure that emai...
Read Article →One of the disadvantages of being an experienced consultant in IT is the fact that once in a while you need to re-learn. With re-learn I mean that ...
Read Article →During its annual Microsoft Ignite 2019 conference this week, Microsoft announced a new feature for Conditional Access called Report-Only mode in p...
Read Article →While browsing the new Microsoft 365 Device Management portal I noticed the following option: “Guided scenarios (preview)”. From the Wh...
Read Article →While implementing Intune at my customers I rarely encounter green field implementations where computers and mobile devices are newly delivered and...
Read Article →In my blog article series on Conditional Access Demystied I mentioned that Conditional Access can be used to route sessions toward Microsoft Cloud ...
Read Article →Starting with the Intune release from October 14th 2019, Microsoft made available a new functionality called “Policy Sets”. ...
Read Article →TL;DR; – When reinstalling Windows on a Surface Pro 6 and it fails, make sure that you “temporarely” disable the ” Enable b...
Read Article →Made available to more than just E5 licencees earlier this year, MyAnalytics will, by default, send users weekly emails regarding their work patter...
Read Article →In Q1 2017 Microsoft released the Pass Through Authentication (PTA) functionality as part of Azure AD connect. With the release of Azure Active Dir...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →While teaching the 20533C course to students I provide them with more information about the topics covered in the training. Perhaps they can help y...
Read Article →Update (December 11th 2015): Today Microsoft released a hotfix for the Self Service Portal, the hotfix (KB3124091) can be downloaded from Microsoft...
Read Article →With the release of System Center 2012 Configuration Manager, Microsoft introduced the distribution point groups functionality. Distribution point ...
Read Article →When Microsoft released System Center 2012 R2 Service Manager in October 2013, I was quite suprised that the server the webparts for the Self Servi...
Read Article →At a customer of mine a issue with Incident Requests in System Center 2012 R2 Service Manager was reported. Some users reported that they received ...
Read Article →The post Service Manager Related Links appeared first on Modern Workplace Blog.
Read Article →Last week we announced our next Windows Management User Group Netherlands meeting. On May the 22nd we have invited Enterprise Client Management MVP...
Read Article →Last week we announced our next Windows Management User Group Netherlands Webinar. On May the 6th we have invited Enterprise Client Management MVPs...
Read Article →This blogpost will detail my experiences and insights gained from implementing Role Based Access Control (RBAC) in a System Center 2012 R2 Service ...
Read Article →On Wednesday evening the 12th of February the Windows Management User Group Netherlands is organizing a new event. This time the subject throughout...
Read Article →On the 6th of March, the Dutch VMware User Group, which is a subsidairy of the global VMware User Group organizes a conference in the Netherlands. ...
Read Article →Disclaimer: Please test and validate this in your test environment, don’t take the information i provide for granted. This article describes ...
Read Article →Note: I’ve already posted this article a while ago, but since my ex-employer decided to whipe the whole website without asking me if I would ...
Read Article →Before you can start installing System Center 2012 R2 Configuration Manager in your environment you have to install the servers with an OS and conf...
Read Article →Today, a customer contacted me with a very strange issue while installing a new Site System Server in his System Center 2012 R2 Configuration Manag...
Read Article →On Tuesday evening the 17th of September the Windows Management User Group Netherlands organizes its 3rd meeting. The announcement, which is in Dut...
Read Article →Today, after installing a fresh System Center 2012 Configuration Manager Service Pack 1 environment, we experienced that the Boot images for both 3...
Read Article →Text below is in Dutch, together with Bob Cornelissen, Marnix Wolf and Peter Daalmans we created a new User Group called the Windows Management Use...
Read Article →One of the reasons to install multiple primary sites in a System Center Configuration Manager 2007 hierarchy often was due to the fact that Adminis...
Read Article →In the previous post I introduced Role Based Access Control in ConfigMgr 2012 as the new way to delegate administrative access to a ConfigMgr hiera...
Read Article →In the first part of this series I outlined what Microsoft changed in ConfigMgr 2012 in order to introduce Role Based Access Control. In the second...
Read Article →In the first part of this series I outlined what Microsoft changed in ConfigMgr 2012 in order to introduce Role Based Access Control. In the second...
Read Article →During Techdays, the annual event organized by Microsoft in the Netherlands, i had the honor of presenting a session together with Peter Daalmans, ...
Read Article →Update: Microsoft has released CU2 for Configuration Manager 2012 Service Pack 1, allowing you to use Boot images based on Windows 7 from the WAIK ...
Read Article →One of the most time consuming tasks when working with OS Deployment in ConfigMgr is implementing the drivers needed to support different hardware ...
Read Article →In part 1, I showed you how to enable the Branding to Reg steps, and where you could find the information in the registry. Part 2 showed you how yo...
Read Article →In part 1 of this series, I showed you how to enable the Branding to Reg steps, so that during a Task Sequence some information about the Task Sequ...
Read Article →