Hi All,
In this Article i’ll show you how you can “Search and Purge” Emails in Exchange Online.
With Compliance Search you can search for Mails and purge (Soft- or HardDelete) them afterwards. That’s usually the case for Phishing or Spam Incidents. Your search can cover a maximum of 50'000 Mailboxes
A new Compliance Search will create an Alert by default.
First of all you need to have the correct Permissions https://security.
Hi All,
Last Night the February 2023 Exchange Server Security Updates have been released.
Released: February 2023 Exchange Server Security Updates Description of the security update for Microsoft Exchange Server 2019, 2016, and 2013: February 14, 2023 (KB5023038) Security Update For Exchange Server 2016 CU23 SU6 (KB5023038) The downloaded exe File extracts then starts the Installation in a elevated Promt
After the Security Update is installed, it is a good idea to restart the Server.
Hi All,
I’ve stumbled accross the new Microsoft 365 Defender Role-based access control (RBAC). It is still in Preview but i gave it a go.For now you can create the RBAC Roles only in the M365 Defender Portal. But Graph Integration is at least on the Roadmap.
Centrally manage permissions with the Microsoft 365 Defender role-based access control (RBAC) model
Microsoft 365 Defender role-based access control (RBAC)
Let’s have a look.
Hi All,
I had the “pleasure” again this week to Document the Azure AD Policies.
Making several Screenshots in the Azure AD Portal seemed not the best way.
MSGraph: List Conditional Access policies So tried to use the Microsoft Graph Explorer
You need the Permission:
Policy.Read.All https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies
While using the JSON could be one way. It’s not very good if you have to Document it in a Word Document right.
Hi All,
I recently had a case where i needed to access the AzureAD Signin Logs with PowerShell.
I’ve started at the Azure AD Signin Logs and filtered by UPN
Next step was Graph Explorer where i found the needed Permissions
############################################################################### # Graph Explorer ############################################################################### #Go to [https://aka.ms/ge](https://aka.ms/ge) https://graph.microsoft.com/v1.0/auditLogs/signIns https://graph.microsoft.com/v1.0/auditLogs/signIns?&$filter=startsWith(userPrincipalName,'a.bohren@icewolf.ch') Let’s connect with these Permissions (they need Admin Consent and i already have that)
#Import-Module and Connect to Microsoft Graph Import-Module Microsoft.
Hi All,
In January 2024, the legacy multifactor authentication and self-service password reset policies will be deprecated and you’ll manage all authentication methods here in the authentication methods policy. Use this control to manage your migration from the legacy policies to the new unified policy.
How to migrate MFA and SSPR policy settings to the Authentication methods policy for Azure AD (preview) First review current Policies:
MFA policy SSPR policy (if used) Authentication methods policy (if used) Enable “Allow use of Microsoft Authenticator OTP”
Hi All,
New opt-in endpoint for POP3/IMAP4 clients that need legacy TLS
Exchange Online ended support for TLS1.0 and TLS1.1 in October 2020. This year, we plan to disable these older TLS versions for POP3/IMAP4 clients to secure our customers and meet compliance requirements. However, we know that there is still significant usage of POP3/IMAP4 clients that don�t support TLS 1.2, so we�ve created an opt-in endpoint for these clients so they can use TLS1.
Hi All,
Do you know the Certification Authority Authorization (CAA) DNS Records?
With these Records you can control what CA can issue Certificates for your domain.
DNS Certification Authority Authorization CAA implementation mandatory for all certificate authorities by September 2017.
RFC 8659 DNS Certification Authority Authorization (CAA) Resource Record That Record means no CA is allowed to issue Certificates and Wildcard Certifcates for that Domain
domain.tld. IN CAA 0 issue ";" domain.
Hi All, Recently i came across an interessting Project. Now i had some Time to check it out.
Microsoft Azure AD Assessment
https://github.com/AzureAD/AzureADAssessment ## Install Module
Install-Module AzureADAssessment
## Authenticate using a Global Admin or Global Reader account.
Connect-AADAssessment
## Export data to "C:\AzureADAssessment" into a single output package.
Invoke-AADAssessmentDataCollection
It's important to say, that you have to use PowerShell 7. Seems to be that you need to have an Azure Active Directory P2 License to gather all the Logs.
Hi All, I've seen some Posts about the new Microsoft Authenticator settings in AzureAD. Here is how you get there. Go to the Azure Active Directory Portal https://aad.portal.azure.com and select "Security"
On the Security Page open "Authentication methods"
On Authentication methods select "Microsoft Authenticator"
On Microsoft Authenticator Settings select "Configure"
Here you can change some settings that are already available quite for a while, but now you have a GUI to it.