From the excellent feature licensing chart by Aaron Dinnage, you can see the Microsoft 365 suite has so many productivity and security components. It’s difficult to know where to start. I’d like to suggest a roadmap for implementing M365 features and getting value out of M365 licensing. The roadmap would be based on dependencies (you need X before you can deploy Y) and it should be prioritised on business value. I also wanted to experiment with the MermaidJS library for creating dependency diagrams.
Exchange Online migration is a complicated project in a large organisation. So complicated that some organisations haven’t completed this yet. There’s many technical integrations and operational processes with this service. Here’s a post about technical and operational problems that can occur when migrating email to Exchange Online. What has tripped you up in an Exchange migration? Let me know what I’ve missed!
I fancied a break and change of workplace. So my wife and I both resigned from our jobs and we’re taking the summer off. 😎
This post has some KQL to report usage of Internet Explorer.
This post has some KQL to report CISA Known Exploited Vulns within your environment.
This post has some KQL to report “who read the sensitive email and who opened the sensitive attachment” using Defender for Office365 and Defender for Endpoint.
This post has some KQL to report on files uploaded to cloud via Microsoft or Google browsers. It requires Office365 sensitivity labels, Defender for EndPoint and (for Google Chrome) the Microsoft Compliance extention
This post is about extending Wifi in my brother-in-law’s ancient farmhouse.
Find all servers, with printer published to users in AD, by looking for printerqueue objects.
Securing Windows PCs starts with managing local administator access. Microsoft Defender for Endpoint logs every login and records if it was a local admin. Use this KQL query in the Advanced Hunting portal to create a report.