The current COVID-19 threat forces more and more companies to use collaburation tools. There are some on the market which are better or worse for this purpose. I myself as a consultant advise my customers on the topic of Microsoft Teams. One question that comes up again and again is the storage of company data. […]

What is the Azure Application Proxy? Azure AD Application Proxy is a feature of Azure AD Premium and Azure AD Basic. It allows publication of internal web-based application to provide Internet access to authorized users in the corporate domain. The Azure AD Application Proxy can be used in place of internal Web Application Proxy Servers […]

At the end of April, Microsoft announced in its Message Center update that Microsoft Bookings, a self-service scheduling tool, will be available for Office 365 from mid-May. Read in this article what you should know about it. What is Microsoft Booking? Microsoft Bookings is an online and mobile app for small businesses who provide services […]

04/05/2020

drago

Microsoft 365

Prolog Recently, I have been getting inquiries from customers, who have the following scenario: The environment was originally an on-premises infrastructure. Then the customers have decided to switch to Office 365 and implemented this step as follow:   The AAD was configured to sync the user accounts to the cloud, but without the Exchange attributes.  […]

With Intune you can manage devices and apps of your employees as well as their access to your company data. To use this Mobile Device Management (MDM) system, devices must first be registered for the Intune service. However, there are several ways to register your employee’s devices. Each method depends on the type of device […]

Prolog At this point I am happy to present the third part of my series “Phishing attack simulation”. In this article we will focus on Brute force Password (Dictionary) attacks. A brute-force attack dictionary is an automated, trial-and-error method of generating multiple passwords guesses from a dictionary file against a user’s password. Identical to Spear […]

Prolog One of the biggest dangers in the industry for IT professionals is attacks on their own company network. There are different types of attacks. As I have described in a previous article, one of the biggest threats are phishing attacks. There are several providers of employee training aimed at improving awareness of such attacks […]

Prolog This article is about an old school topic. In the last few weeks after my vacation, I was supporting a company who had issues between a server and the mail environment to send emails. In this company, the messaging environment is configured that only authenticated systems are allowed to send messages. This I have […]

Microsoft Office 365 allows us in a very easy way to encrypt messages to our recipients. To be able to use Message encryption we need to have either an Office 365 Enterprise E3 or E5 Plan or a Microsoft 365 E3 or E5 Plan. If we don’t have one of those plans but at least […]