M365 - Exchange Online Center

ENow Software's Microsoft Exchange Online blog built by Microsoft MVPs for IT/Sys Admins.

Posts about:

Microsoft

Microsoft Defender listing image

Using Defender for Cloud Apps to Control File downloads

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

One situation I see often with customers is the desire to control and monitor file downloads from the cloud. For most organizations in most industries, it’s important to control your organization's data, and that data is often contained in files. The proprietary nature of information in files makes them very valuable to many organizations, and thusly important to control.

Read More
business woman touching tablet

Modern Authentication Updates in Exchange Online

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

Modern Auth Updates in Exchange Online

The great thing about Office 365 is that it is a constantly updated service. For your subscription, your organization is constantly getting new features and functionality that can greatly improve the overall Office 365 experience. Of course, the downside of that is that IT pros working in Office 365 need to keep up to date on these changes. Luckily for you, you have found this amazing blog post that is going to explain some recent updates to Modern Authentication in Exchange Online.

Read More
domino

The Office 365 Domino Effect

Jeff Guillet (MVP, MCSM) & Justin Harris (MVP, MCSM, MCM)

Over the last several years Microsoft has made tremendous headway in showcasing the value proposition of the Office 365 platform and suite of collaboration tools. In fact, the argument can be made that the Office 365 suite of tools has helped fuel the team-based way of working. A recent report shows that 80% of your time during work hour is spent collaborating like conference calls or meetings.1  McKinsey sheds additional light on this increase in collaboration by stating that 45% of workers are using social technologies to accomplish daily tasks2.

Read More
Configurations screenshot

EMS Security Overview

Lawrence Novak

The security perimeter has changed dramatically over the last 5 years. The landscape has gone from a tightly controlled on-premise environment to data, identities, and devices being spread across on-premise and several cloud systems. How can you protect your data and identities while using a spectrum of on-premise and cloud applications and devices? How do you monitor and identify threats? How can you quickly identify the pre and post-breach of systems across on-premise and the cloud? 

Read More
Microsoft Intune

A look at Microsoft Intune

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

Intune Explained

Intune was born as Microsoft’s Cloud based Mobile Device Management platform. Since then, it has grown into a management platform for both mobile devices and P.C.s. Intune can now manage iPhone, Android, Windows Phone, and some versions of Windows. It’s clear that Microsoft intends to grow Intune into a complete cloud-based device management platform.

The process of planning for an Intune roll out can be difficult. The features and functionality within Intune are ever evolving, so knowing how to deploy Intune effectively takes some studying. In this blog post, we’ll provide an introduction into Intune's current capabilities. We will test out what Intune can do to make your data more secure in a “Cloud First, Mobile First” world. 

Read More
Screen Shot 2017-07-16 at 10.30.01 PM.png

The New Microsoft 365

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM
Microsoft introduced a new product, or at least a new SKU, at Inspire (the new name for the Microsoft partner conference) called Microsoft 365. This new product is a combination of two existing products, and the first "cloud" version of Windows 10.  In this blog post, I'm going to look at Microsoft 365. What it is, what it costs, how you'll use it, and if you want it at all.

What is "Microsoft 365"?

First, it's a terrible name. I get confused as I look back though what I have written in this blog post, so I don’t think it’ll be a surprise to find that this name confuses customers.

Read More
computer code

Enabling DKIM in Exchange Online

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

Spam is the bane of all messaging administrators, as well as a major pain for all email users. Using email means a consistent battle against spam, malware, and unwanted nonsense flooding your inbox. There are a number of different tools and tactics we, as administrators, can use to reduce the impact of these attacks and recently Microsoft has added another one to the toolboxes of Office 365 customers. In this blog post I'm going to explain what DKIM is, and how you can use it to help make the world a safer place for legitimate email messages.

Read More
Hybrid listing image

Hybrid Headache: Hybrid mailbox moves and the “expect 100-continue” header

Image of Michael Van Horenbeeck MVP, MCSM
Michael Van Horenbeeck MVP, MCSM

 

A little over two years ago, I wrote about an issue I encountered with a KEMP load balancer and how Microsoft performs hybrid mailbox moves. More specifically, the issue evolved around a seemingly different interpretation between KEMP and Microsoft regarding the implementation of the expect 100-continue header. As I noted then, the workaround was to configure the KEMP load balancer to ignore the 100-Continue rules as described in RFC 2616.

A while ago, my good friend Bhargav Shukla reached out to me informing me that KEMP had tracked and solved the problem I described back then. As it turns out, Microsoft had based their interpretation of the expect 100-Continue header on RFC 7231 which superseded RFC 2616. I believe KEMP based itself on the latter, ultimately leading to the issue I described. This illustrates that it’s not always easy to keep up with the fast pace in the tech industry…

Read More