Archive
All Posts
Page 1 of 1
View:
EU Data Sovereignty: Self-Hosting vs. Cloud vs. Local Providers, AI Agents, and the Data Transfer Reality - Part 2
Read MoreEU Data Sovereignty vs. US Cloud Providers: Fear, Reality, and What's Really at Stake - Part 1
Read MoreAzure Key Vault: Using Secrets in App Service, Container Apps, AKS and Functions - Part 2
Read MoreAzure Key Vault Fundamentals: RBAC, Auto-Rotate, VNet Isolation, and Private Endpoints - Part 1
Read MoreAzure Key Vault Managed HSM: Single-Tenant Isolation & Key Sovereignty - Part 2
Read MoreAzure Key Vault Premium: HSM-Backed Keys for Compliance - Part 1
Read MoreThe Great PKI Debate: Implementation, Operations, and Security Deep Dive (Part 2)
Read MoreThe Great PKI Debate: Microsoft Cloud PKI vs. Traditional Certificate Services (Part 1)
Read MoreAzure Front Door: Building Global-Scale Resilience After October 2025 Outages
Read MoreMicrosoft Purview: AI-Powered Data Security and Compliance at Enterprise Scale
Read MoreAzure Bastion Now Supports Microsoft Entra ID Authentication for RDP Connections in the Portal
Read MoreMajor Security Enhancement: Zero-Hour Auto Purge (ZAP) for Teams Coming to Defender for Office 365 Plan 1
Read MoreExtending Zero Trust to External Collaboration: Global Secure Access B2B Guest Access
Read MoreAzure DNS Security Policy with Threat Intelligence: Protecting the First Step of Every Cyberattack
Read MoreSecure AI Gateway for Power Platform Agents: Enterprise-Grade Protection for Autonomous AI
Read MoreGitHub Advanced Security Native Integration: Code-to-Runtime Protection with Microsoft Defender for Cloud
Read MoreMicrosoft Defender for Cloud in the Unified Security Portal: Your Complete Security Operations Center
Read MoreEntra ID Governance Deep Dive - Part 4: Protecting AI Agents with ID Protection
Read MoreEntra ID Governance Deep Dive - Part 3: ID Protection-Based Approvals Fundamentals
Read MoreEntra ID Governance Deep Dive - Part 2: Advanced Entitlement Management & AI Agent Governance
Read MoreEntra ID Governance Deep Dive - Part 1: Entitlement Management Fundamentals
Read MoreUnified Security Portal: Microsoft Defender for Cloud Meets GitHub Advanced Security
Read MoreSecurity Copilot SCU Allocation in Microsoft 365 E5: The Nordic Reality Check
Read MoreMicrosoft Entra Internet Access: Secure Web Browsing and Generative AI Protection
Read MoreHow to Enable Synced Passkeys (FIDO2) in Microsoft Entra ID (Preview)
Read MoreMicrosoft Sentinel Data Lake: AI-Powered Threat Hunting with Claude, ChatGPT, and Copilot (Part 2)
Read MoreMicrosoft Sentinel Data Lake: Architecture, Setup, and Cost Optimization (Part 1)
Read MoreCloudpartner Academy: Master Microsoft Security Certifications with AI-Powered Learning
Read MoreAdministrator Protection: The Future of Windows Privilege Management (Part 2)
Read MoreUnderstanding Windows Security Tokens: The Foundation (Part 1)
Read MoreCoPhish — Using Microsoft Copilot Studio as a Wrapper: Security Implications for MCPs and AI Agents
Read MoreFuture-Proofing Your Career in 2025: Microsoft Certifications & Learning Path
Read MoreMicrosoft Sentinel: Data Lake (Auxiliary) Tier — cheap long-term log retention
Read MoreWhat’s new in Microsoft Entra – September 2025
Read MoreA Practical Guide to Using User Tags in Microsoft Defender for Office 365
Read MoreWhy SMTP Basic Authentication is Dead (And What to Use Instead)
Read MoreAzure Landing Zone Design Areas—A practical, 2025-ready guide
Read MoreApplication Cleanup in Microsoft Entra: A Practical Deep Dive
Read MoreIntegrating Okta with Entra ID EAM
Read MoreEntra External ID: Deployment Strategy and B2C Transition
Read MoreModernizing Entra Connect Authentication
Read MoreMandatory MFA in Microsoft Entra: What You Need to Know
Read MoreSMS Sign-In in Entra ID
Read MoreFrom B2C to EEID: What You Need to Know?
Read MoreEntra ID Workforce vs. Customers tenant - A Technical Comparison
Read MoreMicrosoft to Retire Entra Service Principal-Less Authentication
Read MoreAZ-500 Study guide - Section 4 - Manage identity and access - Manage Microsoft Entra application access
Read MoreRed Teaming for Generative AI: Microsoft’s Vision for Safer, Trustworthy AI
Read MoreEntra ID vs. Okta: Choosing the Right IAM Solution for Your Organization
Read MoreSubscribe to get access for deep learning
Read MoreMicrosoft Security Copilot: Revolutionizing Data Security Investigations with AI-Powered Deep Content Analysis
Read MoreMicrosoft Entra ID Security Features and Best Practices
Read MoreExploring Microsoft Azure’s Security Technical Capabilities
Read MoreManage guest user lifecycle in Entra ID
Read MoreAZ-500 Study guide - Section 3 - Manage identity and access - Manage Microsoft Entra authorization
Read MoreIdentity verification via Persona
Read MoreAZ-500 Study guide - Section 2 - Manage identity and access - Manage Microsoft Entra authentication
Read MoreAZ-500 Study guide - Section 1 - Manage identity and access - Manage Microsoft Entra identities
Read MoreUpdated Exam Cram for Exam AZ-500: Microsoft Azure Security Technologies
Read MoreBring Your Brand to Sign-Ins: Enable Custom Domains for External ID
Read MoreExternal authentication method (EAM) in Entra
Read MoreMulti-tenant management in Microsoft Defender
Read MoreGraph activity logs is now generally available
Read MoreUnify SIEM and XDR for Enhanced Threat Detection
Read MoreDefender for Office 365 and QR-code phishing
Read MoreSection 17 - Implement and manage privacy requirements by using Microsoft Priva
Read MoreSection 16 - Implement and manage Microsoft Purview Information Barriers (IBs)
Read MoreSCIMming with PIM for Groups
Read MoreDeep Dive into Conditional Access Policies
Read MoreHow many Conditional Access policies you can create?
Read MoreSection 15 - Implement and manage Microsoft Purview Insider Risk Management
Read MoreSection 14 - Implement and manage Microsoft Purview Communication Compliance
Read MoreWhat is Zero-hour auto purge (ZAP) in MDO and how does it help you?
Read MoreDeep dive on Copilots and Security
Read MoreIn-browser protection with Microsoft Edge for Business (Preview)
Read MoreSection 13 - Manage and analyze audit logs and reports in Microsoft Purview
Read MoreSection 12 - Plan and manage eDiscovery and Content search
Read MoreSection 11 - Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager
Read MoreEncrypting Data-At-Rest with Customer Managed Keys in M365
Read MoreEntra ID - Convert external users to internal (Preview)
Read MoreInsider Risks and Conditional Access
Read MoreMy tenant has Security defaults enabled and I want to disable them. What to do?
Read MoreSection 10 - Implement Microsoft Purview records management
Read MoreSection 9 - Manage data retention in Microsoft 365 workloads
Read MoreSection 8 - Implement data lifecycle and records management - Retain and delete data by using retention labels
Read MoreSection 7 - Implement DLP - Monitor and manage DLP activities
Read MoreSection 6 - Implement DLP - Implement and monitor Endpoint DLP
Read MoreSection 5 - Implement DLP - Create and configure DLP policies
Read MoreSection 3 - Implement information protection - Design and implement encryption for email messages
Read MoreSection 2 - Implement information protection - Rest of sensitivity label content and Design
Read MoreSection 2 - Implement information protection - Implement and manage sensitivity labels
Read MoreSection 1 - Implement information protection - Create and SITs and trainable classifiers
Read MoreExam cram for SC-400 - Administering Information Protection and Compliance in M365
Read MoreMicrosoft Entra ID Governance
Read MoreEntra ID CA Templates are now Generally Available!
Read MoreSecurity Service Edge (SSE) in a secure access service edge Framework (SSA)
Read MoreSection 15 - Hunt for threats using Microsoft Sentinel
Read MoreSection 14 - Use Microsoft Sentinel workbooks to analyze and interpret data
Read MoreSection 13 - Mitigate threats using Microsoft Sentinel - Manage Microsoft Sentinel incidents
Read MoreProactive migration of legacy MFA and SSPR policy settings to Authentication methods
Read MoreCross-tenant synchronization is now Generally available
Read MoreSection 13 - Mitigate threats using Microsoft Sentinel - Configure Security Orchestration, Automation, and Response (SOAR)
Read MoreMicrosoft Entra External ID's (Preview)
Read MoreSection 12 - Mitigate threats using Microsoft Sentinel - Perform data classification and normalization
Read MoreAzure AD Application proxy and some previews
Read MoreAzure (AD) recommendations with some explanations
Read MoreAzure Arc with Defender for cloud
Read MoreSection 11 - Mitigate threats using Microsoft Sentinel - Manage Microsoft Sentinel analytics rules
Read MoreSection 10 - Mitigate threats using Microsoft Sentinel - Plan and implement the use of data connectors for ingestion of data sources
Read MoreMicrosoft certification changes and study materials
Read MoreSection 8.2 - Mitigate threats using Microsoft Defender for Cloud - Configure and respond to alerts and incidents in Microsoft Defender for Cloud
Read MorePower Platform and customer-managed encryption key (preview) with some HSM
Read MoreSection 8.1 - Mitigate threats using Microsoft Defender for Cloud - Configure and respond to alerts and incidents in Microsoft Defender for Cloud
Read MoreSection 7 - Mitigate threats using Microsoft Defender for Cloud - Plan and implement the use of data connectors for ingestion of data sources in Microsoft Defender for Cloud
Read MoreSection 9 - Mitigate threats using Microsoft Sentinel - Design and configure a Microsoft Sentinel workspace
Read MoreAzure AD External Identities with SAML IdP part 2 of 2
Read MoreAzure AD External Identities with SAML IdP part 1 of 2
Read MoreSection 6 - Mitigate threats using Microsoft Defender for Cloud - Implement and maintain cloud security posture management and workload protection
Read MoreSection 5 - Mitigate threats using Microsoft 365 Defender - Manage extended detection and response (XDR) in Microsoft 365 Defender
Read MoreAzure AD Privileged Identity Management and new features
Read MoreSection 4 - Mitigate identity threats part 2 of 2
Read MoreSection 4 - Mitigate identity threats part 1 of 2
Read MorePostponed timeline for Number matching
Read MoreSection 3 - Mitigate endpoint threats by using Microsoft Defender for Endpoint
Read MoreSection 2 - Mitigate threats using Microsoft 365 Defender - Mitigate threats to the productivity environment by using Microsoft 365 Defender
Read MoreNumber matching and Authentication methods why you should enable them?
Read MoreAzure Chaos Studio (Preview)
Read MoreSection 1 - Mitigate threats using Microsoft 365 Defender - Mitigate threats to the productivity environment by using Microsoft 365 Defender
Read MoreExam cram series for SC-200 exam
Read MoreThe history of Offline files and how to affect the future?
Read MoreCross-tenant synchronization (Preview)
Read MoreMicrosoft 365 Defender role-based access control
Read MoreWhat is IPv6 and why you should use in Azure?
Read MoreAzure AD Access reviews and the power of Machine learning
Read MoreConditional Access templates (Preview) and other tips on the side
Read MoreMicrosoft Defender for Office 365 Detection Details Report
Read MoreAzure Front Door and Zero-downtime migration now in Public preview!
Read MoreDo's and don'ts concerning security for Identity part 7
Read MoreCross-tenant User Data Migration is Now Generally Available!
Read MoreWhat is Azure Key Vault Managed HSM, how to install and eventually remove (if needed)
Read MoreDo's and don'ts concerning security for Identity part 6
Read MorePowerShell 7.2.7 and Could not load type 'System.Security.Cryptography.SHA256Cng'
Read MoreAccessing Azure SQL with different methods
Read MoreDo's and don'ts concerning security for Identity part 5
Read MoreDo's and don'ts concerning security for Identity part 4
Read MoreAdditional context in Microsoft Authenticator notifications is now generally available!
Read MoreChromeOS Flex and my findings for the security
Read MoreDo's and don'ts concerning security for Identity part 3
Read MoreCertificate-based authentication is generally available!
Read MoreTips for studying and passing Microsoft Security exams - Updated (Ignite 2022) version
Read MoreAzure Automation Account and Run as account deprecation
Read MoreConditional access and authentication strength (preview)
Read MoreTips and tricks on Securing your Data factory
Read MoreAzure firewall basic in public preview
Read MoreDo's and don'ts concerning security for Identity part 2
Read MoreDo's and don'ts concerning security for Identity part 8
Read MoreDefender for Cloud security alerts
Read MoreMicrosoft Defender SmartScreen in Windows 11 22H2
Read MoreWhat's new with Secure score in Microsoft Defender portal (and some other tips)
Read MoreDo's and don't concerning security for Identity part 1
Read MoreMicrosoft Defender External Attack Surface Management (Defender EASM)
Read MoreHow to use Azure Key Vault with managed identities and generating keys with auto-rotation
Read MoreMicrosoft managed Authentication Methods Policy (Preview)
Read MoreAzure MFA migration tool and how to setup MFA NPS extension
Read MoreAutomatic assignment policy in Entitlement management
Read MoreSection 7 - Design a strategy for data and applications - Specify security requirements for applications and design a strategy for securing data
Read MoreSection 6 - Design security for infrastructure - Design a strategy for securing SaaS, PaaS, and IaaS services
Read MoreTOTP globally available for Azure AD B2C
Read MoreSection 5 - Design security for infrastructure - Design a strategy for securing server and client endpoints
Read MoreMicrosoft Entra Verified ID went GA!
Read MoreMicrosoft Defender for Cloud Apps in Microsoft 365 Defender (Preview)
Read MoreSection 4 - Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies - Design a regulatory compliance strategy
Read MoreMover.io retirement
Read MoreSection 3 - Design a Zero Trust strategy and architecture - Design an identity security strategy
Read MoreSection 2 - Design a Zero Trust strategy and architecture - Design a security operations strategy
Read MoreSection 1 - Design a Zero Trust strategy and architecture - Build an overall security strategy and architecture
Read MoreExam cram for Cybersecurity Architect exam
Read MoreMicrosoft Entra Permissions Management
Read MoreWhat's new with Cross-tenant access with Azure AD External Identities
Read MoreMicrosoft authenticator password generator and couple of other new features
Read MoreSection 14 - Secure data and applications - Configure security for databases
Read MoreSection 13 - Secure data and applications - Configure security for storage
Read MoreKey auto-rotation in Azure Key Vault now GA!
Read MoreHow handle security in a Power BI environment?
Read More2022 H1 Cumulative Updates for Exchange Server
Read MoreMicrosoft Compliance rebranded as Microsoft Purview
Read MoreSection 12 - Manage security operations - Configure and manage security monitoring solutions
Read MoreOld PowerShell modules vs Microsoft Graph SDK and MSAL vs ADAL
Read MoreSection 15 - Secure data and applications - Configure and manage Azure Key Vault
Read MoreSection 11 - Manage security operations - Configure and manage threat protection - Defender for SQL and Threat Model Tool
Read MoreSection 10 - Manage security operations - Configure and manage threat protection
Read MoreSection 9 - Manage security operations - Configure centralized policy management
Read MoreSection 8 - Implement platform protection - Configure advanced security for compute - Serverless, App service and encryption
Read MoreSection 17 – Plan and Implement an Identity Governance Strategy – Monitor and maintain Azure Active Directory
Read MoreSection 13 - Implement Access Management for Apps - Implement app registrations
Read MoreSection 16 – Plan and Implement an Identity Governance Strategy - Plan and implement privileged access
Read MoreAzure AD connect version 2.1.1.0 released with bugfixes
Read MoreSection 15 – Plan and Implement an Identity Governance Strategy - Plan, implement and manage access reviews
Read MoreSection 14 – Plan and Implement an Identity Governance Strategy - Plan and implement entitlement management
Read MoreAdministrative units in AAD and some preview features
Read MoreSome of my personal favorites for auditing Microsoft environments
Read MoreWhat is Azure B2C and how to use custom policies?
Read MoreCross-tenant access settings and Teams connect shared channels
Read MoreRecovering accidentally deleted service principal objects
Read MoreSection 12 – Implement Access Management for Apps – Plan, implement, and monitor the integration of Enterprise Apps for SSO – Custom SaaS and gallery apps and user provisioning
Read MoreSection 11 – Implement Access Management for Apps – Plan, implement, and monitor the integration of Enterprise Apps for SSO – Monitoring, AAD App proxy and SSO
Read MoreSection 10 - Implement Access Management for Apps - Plan, implement, and monitor the integration of Enterprise Apps for SSO - Defender for Cloud Apps and App management
Read MoreEnablement of combined security information registration for Azure Active Directory, Beginning on 1st of October 2022
Read MoreSection 9 - Implement an Authentication and Access Management Solution - Manage Azure AD Identity Protection
Read MoreSection 9 - Implement an Authentication and Access Management Solution - Plan, implement and administer conditional access
Read MoreSection 8 - Implement an Authentication and Access Management Solution - Manage user authentication
Read MoreSection 7 - Implement an Authentication and Access Management Solution - Plan and implement Azure MFA
Read MoreSection 6 – Implement an Identity Management Solution – Implement and manage hybrid identity – AADC health, sync errors
Read MoreAnnouncing mentoring for the community!
Read MoreAzure GitHub Export and Visual studio code
Read MoreMulti-stage access review (preview)
Read MoreSection 7 - Implement platform protection - Configure advanced security for compute - Security and access for container services
Read MoreSection 5 – Implement an Identity Management Solution – Implement and manage hybrid identity - PTA, SSO and ADFS
Read MoreDo You know about Azure Service tags?
Read MoreSection 4 – Implement an Identity Management Solution – Implement and manage hybrid identity - AADC, Cloud Sync and PHS
Read MoreSection 3 - Implement an Identity Management Solution - Implement and manage external identities - Azure AD and IdP
Read MoreSection 2 - Implement an Identity Management Solution - Create, configure, and manage identities - User, groups and licenses
Read MoreSection 1 - Implement an Identity Management Solution - Implement initial configuration of Azure Active Directory
Read MoreSC-300 exam preparation series
Read MoreSection 6 - Configure advanced security for compute - Endpoint protection and security updates for VMs
Read MoreAAD Connect multi-tenant sync now available
Read MoreSection 5 – Implement platform protection – Implement advanced network security – Implement Azure DDoS and Private Links
Read MoreSection 5 – Implement platform protection – Implement advanced network security – Configure a resource firewall and network isolation
Read MoreSection 5 – Implement platform protection – Implement advanced network security – Create and configure a Web Application Firewall (WAF)
Read MoreAzure AD certificate-based authentication (Preview) + Publishing CRL with Application Proxy
Read MoreAzure AD Verifiable Credentials (PowerShell version)
Read MoreSection 5 – Implement platform protection – Implement advanced network security – Create and configure Azure Application Gateway
Read MoreCross-tenant access settings (Preview)
Read MoreSection 5 - Implement platform protection - Implement advanced network security - Azure Firewall
Read MoreSection 5 - Implement platform protection - Implement advanced network security - Hybrid and virtual networks
Read MoreRunning PowerShell scripts under Azure Automation Accounts
Read MoreSection 4 - Manage access control
Read MoreSection 3 - Manage application access
Read MoreSection 3 - Manage application access - App Registrations
Read MoreSection 3 - Manage application access - Integrate single sign-on (SSO) and identity providers for authentication
Read MoreSection 2 - Secure access by using Azure AD - Configure access reviews
Read MoreSection 2- Secure access by using Azure AD - Implement passwordless authentication
Read MoreSection 2 – Secure access by using Azure AD – Implement Azure AD Identity Protection
Read MoreSection 2 - Secure access by using Azure AD - Implement Conditional Access policies, including multifactor authentication
Read MoreSection 2 - Secure access by using Azure AD - How to Configure Azure AD Privileged Identity Management (PIM)
Read MoreSection 1 - Manage Azure Active Directory identities
Read MoreAZ-500 exam preparation series
Read MoreMulti-tenant App registration and user (Admin) consent
Read MoreAzure B2C with AFD and custom domain(s)
Read MoreMicrosoft Authentication Library (MSAL) and Microsoft Graph
Read MoreAzure storage accounts and how to secure them?
Read MoreStorage accounts and the differences between SAS keys and Access keys.
Read MoreKey auto-rotation in Azure Key Vault (preview)
Read MoreAzure AD Connect 2.0.89.0 - How to un-break your Exchange Hybrid
Read MoreAzure AD Connect v. 2.0.88.0 released
Read MoreAAD Connect - Multiple Azure AD tenants (Public preview)
Read MoreSSPR writeback to disconnected forests using AAD cloud sync (Public preview)
Read MoreInformation barriers, the GUI experience (Public preview)
Read MoreLog4j explanation and Microsoft services (Mostly)
Read MoreMicrosoft's *new* certification tests and study material
Read MoreAzure Enterprise-scale or Resource groups?
Read MoreFirewall Manager | DDoS Protection Plans (Preview)
Read MoreWhat is Azure B2C and how to use it?
Read MoreSection 5 – Implement platform protection - Implement advanced network security - Create and configure Azure Front Door
Read MoreAzure Container Apps (Still in Preview?)
Read MoreWhats new with conditional access and Microsoft authenticator
Read MoreMoving from SfB Hybrid to Teams-only
Read MoreAzure SQL Database pricing and security features
Read MoreSign-in to Azure AD with email as an alternate login ID (still in Preview)
Read MoreTemporary Access Pass what and the how
Read MoreMandatory one-time password is coming, are you ready?
Read MoreInsider risk management continued, device onboarding and protection
Read MoreSharePoint tenant rename, why and how?
Read MoreRenaming Defender family and new security features
Read MoreConditional Access - CAE and Resilience defaults
Read MoreInsider risk management, what, why and how
Read MoreInformation governance and adaptive scopes
Read MoreAIP Scanner and how to dig your content
Read MoreThree tiers of protection explained with use cases
Read MoreTips for studying and passing Microsoft certificate exams - Updated (Ignite) version
Read MoreHybrid identity and how to protect your users?
Read More(D)ata (L)oss (P)revention, content escapes your hands
Read MoreAccess reviews for External Guest users
Read More(A)zure (I)nformation (P)rotection why and how?
Read MoreRetention policies why and how?
Read MoreAzure AD guest users and how to manage them?
Read MoreAAD Identity protection and Hybrid Identity
Read MoreContinuous Access Evaluation and working with tokens
Read MoreKali Linux in Azure VM
Read MoreDefender for Identity deep dive part 1 of 3
Read MoreAzure MFA Extensions and Network Policy Server
Read MoreAutodiscover redirect leakage
Read MoreOffice 365 ORCA and Configuration analyzer
Read MoreWhat's new with AAD Connect V2 and why to migrate?
Read MoreHow integrate Azure defender with Azure ARC to multiple environments
Read MoreTips for passing Microsoft "role" based certificate exams (that helped me)
Read MoreHybrid identity best practices
Read MoreAzure Defender for container registries
Read MoreModernize your 0ldSk00l VPN and legacy shares
Read MoreJourney into Azure DevOps - Part 1
Read MoreIdentity protection in the cloud and of the cloud part2
Read MoreIdentity protection in the cloud and of the cloud.
Read MoreEnterprise applications SSO with custom manifest configuration
Read MoreUsing attack simulator for user education and gather insights.
Read MoreWhy to use Compliance Manager for assessments and attack simulator to educate users.
Read MoreWhy to go passwordless and how get there?
Read MoreSQL history and migration to Azure with security of Defender.
Read MoreAzure AD Entitlement Management
Read MoreMongoDB Cloud and Azure SSO with Okta
Read MoreAzure AD Connect family version 1.x deprecation On 31 August 2022.
Read MoreChaosDB vulnerability and Azure Blob storage.
Read MoreExchange and hybrid identity
Read MoreAAD Connect compared to new Azure Cloud sync
Read MoreIdentity is the new perimeter and why information protection matters.
Read MoreUsing Azure File Shares with On-Prem ADDS Authentication and S2S VPN Tunnel
Read MoreExchange Modern public folders and how-to cope with them.
Read MoreConnect to Cloud with or without MFA and replace user licenses with menu.
Read MoreAzure Dynamic Groups and how to use Extended attribute.
Read MoreCutover-migration from SFB Onpremises to Teams with Enterprise Voice.
Read MoreSearch-Mailbox and overcoming 10.000 item limit.
Read MoreAzure Cognitive Services - Speech
Read MoreSQL Server Backup from inside Azure VM
Read MoreTop 10 actions to secure your environment
Read MoreGet updates /w Email when EOP smtp ip-addresses change.
Read MoreEnabling .NET Framework 3.5 on Windows 10 Build 1809
Read MoreConnecting to SFB Online Powershell in Hybrid
Read MorePublic folders in Hybrid Screnario
Read MoreSharepoint Online recursive permissions.
Read MoreVPN stuck on connecting or disconnecting.
Read MoreO4B Bulk Provisioning.
Read MoreOutlook 2016 and ADAL
Read MoreSharepoint Config cache reset.
Read MoreOffice 365 Group and alias email-address.
Read MoreSharepoint 2013/16 and WSS_Logging DB
Read MoreDirect Access and reporting out-put in Powershell.
Read MoreGetting started with Windows Autopilot
Read MoreCustomize W10 Start-Menu Start Tiles & Taskbar
Read MoreExchange updates
Read MoreLync/SfB Server: Event 41026, LS Data MCU after May 2017 .NET Framework update
Read MoreRecipient deferred because there is no Mdb.
Read MoreWIN10 - Remove AppX Packages directly from .ISO file.
Read MoreSCCM TS: Prompt for Computer Name with PowerShell
Read MoreDirect Access with Citrix Netscaler and Storefront
Read MoreMRSProxy Endpoint error while doing remote move migration
Read MoreWindows 10 Creators Update
Read MoreGet-mailbox together with get-mailboxstatistics
Read MorePolycom software update
Read MoreRemove obsolete Logs from Exchange 2013/2016
Read MoreMigrate files to Onedrive with Powershell script.
Read MoreGet a Msolusers with License details to seperate CSV-files.
Read MoreAndroid for Work status Failed in SCCM console after CB1702 Update
Read MoreScript that assigns Office 365 licenses based on Group membership.
Read MoreVerify Exchange update rollup version
Read MoreWhat to do when VCenter start fails after demoting Domain Controller
Read MoreRemote powershell to Lync 2010 / 2013 FE
Read MoreFind SQL-database backup dates
Read MoreHow to display only user databases in SQL
Read MoreCan’t change Office 2013 shortcut locations in the Office Customization Tool
Read MoreRemoving the Temporary Attribute from Multiple Files with Powershell
Read MoreExchange 2010 sp3 RU5 and Online tenant Hybrid
Read MoreAdd SIP address to all users in certain OU
Read MoreSMTP high availability with one ip address
Read MoreHow to migrate CA Root from server to another
Read MoreMigrate two different Exchange forest with the same netbios name to Office 365 with dirsync.
Read MoreOutlook 2013 stuck on Loading user profile.
Read MoreFully automated uninstallation of Office 2007 / 2010 and Installation of Office 365 Click-To-Run
Read MoreTrustModelData: registry keys for the Lync Clients.
Read MoreLync and Exchange Web Services (EWS) and different DNS Domains- Exchange crawling e.g. for presence
Read MoreHow to set Exchange AutodiscoverVirtualDirectory Url's to Empty
Read MoreLync 2013 Response Groups Usage Report not working.
Read MoreExchange 2010 - Purge Deleted Items before retention limit kicks in.
Read MoreInstalling Windows Server 2012 R2 Direct Access and Windows 7 / 8
Read MoreHint of the day! URL that you can open a ticket to Microsoft.
Read MoreFind unlicensed users with powershell in Office 365 and apply a license.
Read MoreChange upn-suffix for all the users in certain OU
Read MoreSorry we’re having trouble signing you in with Office 365
Read MoreCRM 2013 sp1 and a new List component
Read MoreExport biggest mailbox users with attributes to csv!
Read Moreget-aduser old mail-attribute and set-aduser to a new one and keeping the old prefix.
Read MoreIncrease the maximum MAPI session limit from 32 concurrent to 5000 concurrent
Read MoreAdd or Remove Bulk permissions to Exchange mailboxes.
Read MoreRenew CA-ROOT and crl lists to use with Forefront UAG Direct Access.
Read MoreWindows Server 2008/2012/2012 R2 - Automatic Reboot after Updates if users logged in
Read MoreAfter Cumulative Updates in Exchange 2013 ECP and OWA will be broken ... sometimes?
Read MoreClear Exchange 2013 Log Files based on age.
Read MoreLync and IIS ARR (Application Routing Request)
Read MoreExchange 2010 and error 1022
Read MoreSharepoint 2007 and attaching content database with SQL 2012 R2
Read MoreFind Lync user with specific Line Uri
Read MoreDirect Access and wrong DTE addresses and how to fix 'em.
Read MoreFind all numbers assigned in Lync.
Read MoreLync edge and broken replication with CMS.
Read MoreEmergency calls with Lync in Finland
Read MoreTransfer SQL Logins and their passwords.
Read MoreEnable multiple RDP Sessions 2008/2012 servers.
Read MoreMove Sharepoint database to a different server.
Read MoreCisco VPN on Windows 8.1 – Reason 442: Failed to enable Virtual Adapter
Read MorePoodle and how to fix it.
Read MoreInstall SQL when reboot is pending
Read MoreAdd a Group as delegate to Room or Resource mailbox.
Read MoreAllow External senders to create meetings to a room mailbox.
Read MoreSet Booking Window for all Room Mailboxes with powershell.
Read MoreSkype for Business
Read MoreSkype for Business 2015 Protocol Workloads Poster.
Read MoreTeamviewer thru rdp-session and "The screen cannot be captured at the moment..."
Read MoreAn external adapter with a public IP address, IPv6 enabled and without a domain profile cannot be located.
Read MoreDHCP migration from 2003 to 2012 r2
Read MoreRecover deleted emails with powershell
Read MoreAssign permissions for mailboxes before migration.
Read MoreReset password of Local Admin account from Windows XP to Windows 10.
Read MoreRestore emails from disconnected users mailbox.
Read MoreHow to Find your missing dirsync server.
Read MoreInstall Office 365 proplus to terminal server.
Read MoreAccess Denied error when assigning Lync or Exchange attributes to a user.
Read MoreCisco VPN-client and Windows 10.
Read MoreSysprep Windows 8 and Windows 10
Read MoreThe Enterprise Mobility Suite Portal Survival Guide.
Read MoreHow to change Network Location Profile manually.
Read MoreUser has db_owner my mistake.
Read MoreAdd a PIN code to Windows 10.
Read MoreExchange Online EOP Block lists
Read More420 4.2.0 RESOLVER.ADR.Ambiguous; ambiguous address
Read MoreLumia 950 XL
Read MoreCreate UserPrincipalName attribute filter in AAD Connect.
Read MoreGet Migration User statistics.
Read MoreMoving a Hybrid user back to Onprem Exchange.
Read MoreRemove SMTP address for a specific domain from all mailboxes.
Read MoreForce Full Password Sync with AAD Connect.
Read MoreAdd a Forest Level Trust.
Read MoreADFS 3.0, Intune with Apple and Anroid devices. EventID 364. MSIS7102: Requested Authentication Method is not supported on the STS.
Read MoreAdd all licensed users to a Mail Enabled Security Group and then assign permissions to RecipientType.
Read MoreMissed calls not showing in conversation history.
Read MoreEnable or Disable Trace Logging in Dirsync and Azure AD Connect.
Read MoreGet all user lisences from Office 365 to csv.
Read MoreHow to find computers with a name starting with something and add them to a security group.
Read MoreFind a User with certain SID.
Read MoreAssign Permissions to all mailboxes using Mail Enabled Security Group.
Read MoreSkype For Business Hybrid and Get-Webticket error 0x80048257.
Read MoreAzure AD Connect with ADFS customization.
Read MoreJava and Shibboleth authentication with Azure REST API and ADFS.
Read MoreExport All Mailboxes Calendar permisson to CSV
Read MoreAdd Calendar permissions to mailboxes in Hybrid environments.
Read MoreADFS-failover PrimaryServer to Secondary.
Read MoreMigrate from Cloud identities to Azure AD Connect.
Read MoreO365 hybrid mailbox move, largeitem skipped warnings
Read MoreO365 hybrid mailbox move, "A corrupted item was encountered: Unable to translate principals for folder"
Read MoreCopilot for Security: Your AI Partner 🤖
Read MoreFrom Alert to Action: Using Purview DSI with Entra ID for End‑to‑End Data Breach Response
Read More🛡️ Smarter Access Control in Microsoft Entra ID
Read MoreThis is why I think you should join CCPs 💯
Read More
Page 1 of 1
View: