Hi All, I was inspired to look a little bit deeper into the Update Mechanism of Microsoft Teams by the "Teams MSI Override" GitHub Project. You can check your Version in Teams by Settings > Info > Version
Then the current Version and update Date is shown in the top bar
You can invoke a update check in Settings > check for updates
Then Teams will search for updates
I've traced this Action in Fiddler
Hi All, Over a Year ago i did wrote a Azure Automation Script to check your M365 Licenses.
Check your M365 Licenses with Azure Automation
https://blog.icewolf.ch/archive/2021/04/18/check-your-m365-licenses-with-azure-automation.aspx I did rewrite that code to support Microsoft Graph for query the Licenses and also send the Mail via Microsoft Graph. Setup Environement I first created a new AzureAD Application (just to make a clear separation of Graph Permissions for the purpose of this Demo).
Hi All, Release Notes and Download
https://github.com/microsoft/PowerToys/releases/
There is a new Activation method for "Find my Mouse" by Shaking it. I've tested it and you have to shake quite hard. I'll stick with the "Press Left Control twice".
Regards Andres Bohren
Hi All, VMware published a Security Advisory for the VMware Tools on Windows.
VMSA-2022-0007
https://www.vmware.com/security/advisories/VMSA-2022-0007.html
VMware Tools 12.0.0 Download
https://customerconnect.vmware.com/en/downloads/details?downloadGroup=VMTOOLS1200&productId=1259&rPId=85322
On my ESXi the VM's the VMware Tools are currently running Version 11.3.5
I've extracted the "windows.iso" and renamed it to "WMwareTools12_Windows.iso"
Then uploadet it to the Datastore
Attached it to the VM
And started the setup64.exe
Regards Andres Bohren
Hi All, Recently there was an Annoucement in the M365 Message Center that announced the depreciation of the Get/Set-PhishFilterPolicy. Move to the new Commands
Get-TenantAllowBlockListSpoofItems New-TenantAllowBlockListSpoofItems Set-TenantAllowBlockListSpoofItems Remove-TenantAllowBlockListSpoofItems The Get-PhishFilterPolicy will soon be depreciated
Get-PhishFilterPolicy | ft Sender, SpoofedUser, NumberOfMessages, DecisionSetBy, AllowedToSpoof, SpoofType
To see only the entrys, that are allowed to Spoof
Get-PhishFilterPolicy | where {$_.AllowedToSpoof -eq "Yes"} | ft Sender, SpoofedUser, NumberOfMessages, DecisionSetBy, AllowedToSpoof, SpoofType
Instead use this Command now
Hi All, As many of you i use a lot of Copy & Paste when creating Emails. By default, the Format of the Source will be used - but did you know that you can change that?
These are the default Settings
If you select and copy a few Lines from a Website
This will happen - and you need to use the Paste Context Menu to select "Text only"
Hi All
I have tested the Azure Cost Management anomaly detection Preview.
Public preview: Cost Management anomaly detection for subscriptions
https://azure.microsoft.com/en-us/updates/preview-cost-management-anomaly-detection-for-subscriptions-2/
Regards Andres Bohren
Hi All, In this Blog Article i show how you can Export an Azure SQL Database and import it back on your local SQL Server In the Azure Portal go to your SQL database and hit "Export"
You need to set the Storage Target for your Export
I create a new container at my Storage Account
Once the export starts it takes a while until the Data is exportet
Wait until its completed
Hi All, In my previous Article i have explained how to install SQL Server 2019 Express Edition. That comes without a Management Interface - therefore we need Install SQL Server Management Studio (SSMS) Download SQL Server Management Studio (SSMS)
https://docs.microsoft.com/en-us/sql/ssms/download-sql-server-management-studio-ssms?redirectedfrom=MSDN&view=sql-server-ver15
Now it can be found in the Start Menü
You will be welcomed with the Splash Screen
Then you have to Select your SQL DB Instance Or you can Browse for DB's on your Server or Network
Hi All, A few Weeks ago i received the Mail below that was filtered out as Junk-E-Mail. So i took a closer look as it is legitimate. It contained a "Forgot Password" Link to theyr Portal. These are classic Phishing Techniques-
I took a look at the Mailheaders with the Message Header Analyzer https://mha.azurewebsites.net/ As you can see the Spam Confidence Level (SCL) is high at 5 and it's classified also as spam (SPM).