What is the Azure Application Proxy? Azure AD Application Proxy is a feature of Azure AD Premium and Azure AD Basic. It allows publication of internal web-based application to provide Internet access to authorized users in the corporate domain. The …
At the end of April, Microsoft announced in its Message Center update that Microsoft Bookings, a self-service scheduling tool, will be available for Office 365 from mid-May. Read in this article what you should know about it. What is Microsoft …
The first Cloud8 virtual event will take place on May 22. Here in this article I describe briefly what it is all about… What is Cloud8? Cloud8 is a platform that offers summits at regular intervals. Due to the current …
Recently, one of my customers reported a problem that he was unable to delete a mailbox of a former employee. When trying to do this in the Exchange admin Center (EAC), he received the following error message: I tried …
What has been mentioned for a long time is now becoming a fact, Microsoft Kaizala will be integrated into Office 365. Almost a year ago, Microsoft announced that Kaizala will become a permanent part of Microsoft teams: …
Microsoft sees midsize businesses as users of Office 365 and is setting things in motion to facilitate the migration of a local Exchange environment to the online office. For example, the Microsoft Hybrid Wizard with the Hybrid Agent has received …
Every Microsoft product is very complex in itself, depending on the role and functionality there are different communication channels and protocols which communicate with each other. The same is also true for Exchange. Although Exchange has been rolled out again …
Prolog There are several ways to create a Certificate request (CSR) for SSL Certificates. There are a large number of tools that can help or assist you in this process. Personally, I like to use PowerShell for this. There is …
Prolog Recently, I have been getting inquiries from customers, who have the following scenario: The environment was originally an on-premises infrastructure. Then the customers have decided to switch to Office 365 and implemented this step as follow: The AAD …
With Intune you can manage devices and apps of your employees as well as their access to your company data. To use this Mobile Device Management (MDM) system, devices must first be registered for the Intune service. However, there are …
Prolog At this point I am happy to present the third part of my series “Phishing attack simulation”. In this article we will focus on Brute force Password (Dictionary) attacks. A brute-force attack dictionary is an automated, trial-and-error method of …
Prolog In my last article about this topic I have described how you can perform simulated phishing attacks on your own infrastructure. This is all about raising the awareness of your own employees. If you haven’t read this article yet, …