Creating a standardized and consistent naming convention for IT infrastructures based on Microsoft 365 and Microsoft Azure is essential for efficient management. The following guidelines should be adhered to: General Principles: Consistency: Maintain consistency across all resources, ensuring a uniform and predictable structure. Readability: Names should be easy to read and understand, avoiding unnecessary abbreviations. […]

From time to time I get requests from customers for the following scenario: The customer basically has a hybrid infrastructure, must (or wants to) continue to operate Exchange on-premise. However, the customer wants to protect the Outlook Web App (OWA) of the on-premise messaging infrastructure with Multi Factor. On the one hand, this can be […]

Some time ago, one of my customers had the problem that after his environment was migrated to the cloud (hybrid with Microsoft 365), some users had sporadic logon problems with Microsoft 365 services. The phenomena can be described as follows: Users can log on to Microsoft 365 Services via the browser without any problems (everything […]

Not every company uses Microsoft Intune or System Center, but this does not mean that tools such as Microsoft Defender for Endpoint cannot be used. Only the distribution of the corresponding onboarding packages is not necessarily as simple as when, for example, Microsoft Intune is in use. Many tasks have to be done manually. To […]

In the first parts of the series “.NET Assemblies In PowerShell”, I wrote about managing existing Active Directory groups and user accounts without the PowerShell ActiveDirectory module. This time, I will show you how you can create new Active Directory objects with PowerShell by using the namespace System.DirectoryServices.AccountManagement. This namespace is available on any Windows […]

Strong passwords are an important basis for protecting your data. Unfortunately, many users still use the same passwords for all profiles or use simple combinations such as Welcome123 or their name. But how do you make a password really secure and what tricks can you use to professionally enhance the protection of your data? Here […]

Prolog Recently, I have been getting inquiries from customers, who have the following scenario: The environment was originally an on-premises infrastructure. Then the customers have decided to switch to Office 365 and implemented this step as follow:   The AAD was configured to sync the user accounts to the cloud, but without the Exchange attributes.  […]