In today’s digital landscape, businesses are increasingly grappling with the repercussions of cybercrime. Cyberattacks are escalating in frequency, and the resulting damage is growing at an unprecedented rate. Among the most significant vulnerabilities for organizations are their passwords, which serve as the entry point into an account and, consequently, represent the weakest link in their […]
Microsoft 365 administrators have various roles and tasks that they need to manage to ensure that the organization runs smoothly. Authorization concepts that are familiar from the on-premise world cannot be replicated 1:1 in the Microsoft Cloud. In order to ensure data security, several steps need to be implemented. These are as follows: PIM: […]
For larger environments and/or infrastructures that have more complex network architectures, it can be important to split up the topic-related endpoints and distribute them to dedicated proxies. With Microsoft 365 (as well as other Microsoft services such as Azure), the “best practice” statement is to define local brake out points so that the corresponding services […]
Especially during a messaging migration, situations may arise where external message forwarding has to be set up for several users. One of the reasons, given as an example, may be that the affected users have to be migrated to a new tenant and a new primary SMTP has to be used on this tenant. To […]
Foreword In this article, I describe one (of several) ways in which a mailbox migration can be carried out from, for example, an old on-premise infrastructure to a new Exchange online migration. In my practical example, the two sites are on different tiers, and have no connection to each other. Once again, this is one […]