As more and more organizations move to Office 365 the challenge shifts from “How do we get into Office 365?” to “How do we manage our data within Office 365?” Keeping your organization’s data secure inside the service is a major concern for many organizations, as well as for Microsoft itself.
To that end, Microsoft has put a lot of work into new features in both Office 365 and Azure that can help organizations better secure their data. One of those features is Privileged Identity Management (PIM). PIM is a feature that allows Just in Time administrative rights to be assigned to Office 365 accounts. This means that it is no longer necessary to maintain accounts with administrator privileges always assigned. With PIM your organization can setup accounts for your Office 365 administrators that do not have administrative rights until they are needed. When an administrator in your organization needs to make changes within the service, they can request elevation of their account though an automated process. Read More
Activating PIM roles with PowerShell Read More
In this session we’ll dive into activating Privileged Identity Management roles with PowerShell. We will walk through the problem of activating PIM roles, and how a simple PowerShell script can be used to simplify this process. This session is not about PIM specifically, but more about what it takes to automate this process with PowerShell.
Teams is Microsoft’s collaboration hub within Office 365. Teams was originally introduced as a direct answer to Slack, but it’s become a much bigger solution than that over the last two years it has been publicly available within Office 365.
According to recent numbers from Microsoft, Teams is now in use at more than 500,000 organizations across the world. With a new service of this scope there is going to be a long adoption period, while organizations wrap their collective heads around how to use a service like this. Hopefully this blog post will start that education and adoption process for a few more Office 365 customers. Read More
Sometimes things don’t go as planned.
I, and a few of my fellow Exchange MVP/MCM friends, tried to write an Exchange book. That book never ended up going anywhere, so now I have these chapters sitting on my computer that no one has ever seen.
I figure it’s time to publish them somewhere, so here goes. You can download these chapters at the link below. They are free, just click through the store and don’t put in any credit card information.
These chapters have not been edited, or cleaned up, or even read in over a year. Read them at your own risk.
https://www.mcsmlab.com/downloads Read More
Office 365 and Azure are where many enterprises do their work, and IT pros need to understand how to keep these tenants secure.
As Office 365 has continued to mature, Microsoft has added more options to share information and work with people outside your organization.
However, inviting external users opens the company to some degree of risk when an outsider gains access to your organization's data. This tip will cover the ways to monitor Office 365 guest users to see who has access to what data and how to modify those rights. Read More