M365 - Exchange Online Center

ENow Software's Microsoft Exchange Online blog built by Microsoft MVPs for IT/Sys Admins.

Posts about:

Office 365 (4)

domino

The Office 365 Domino Effect

Jeff Guillet (MVP, MCSM) & Justin Harris (MVP, MCSM, MCM)

Over the last several years Microsoft has made tremendous headway in showcasing the value proposition of the Office 365 platform and suite of collaboration tools. In fact, the argument can be made that the Office 365 suite of tools has helped fuel the team-based way of working. A recent report shows that 80% of your time during work hour is spent collaborating like conference calls or meetings.1  McKinsey sheds additional light on this increase in collaboration by stating that 45% of workers are using social technologies to accomplish daily tasks2.

Read More
Configurations screenshot

EMS Security Overview

Lawrence Novak

The security perimeter has changed dramatically over the last 5 years. The landscape has gone from a tightly controlled on-premise environment to data, identities, and devices being spread across on-premise and several cloud systems. How can you protect your data and identities while using a spectrum of on-premise and cloud applications and devices? How do you monitor and identify threats? How can you quickly identify the pre and post-breach of systems across on-premise and the cloud? 

Read More
NO1

How to Guide: Microsoft Bookings

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

One of the best things about Office 365 is that we can always count on new features and functionality to be available. Microsoft is constantly working to improve the services already live in Office 365, as well as working to create new services. Some of the new services added do have an additional licensing fee attached, but Microsoft also adds a considerable number of features to the license SKUs already in-place.

Read More
Attack_simulator

A Look at Office 365 Attack Simulator

Image of Vasil Michev MVP
Vasil Michev MVP

A few weeks back, Microsoft announced the Public Preview of a new and very interesting feature, named Attack Simulator. The idea behind Attack Simulator is to give you a safe toolset to use in order to probe some aspects of the security of your organization when it comes to email hygiene and password strength, with more to come in the future. In this article, we will do a quick overview of Attack Simulator.

Read More
Solutions Engine blog listing image

The Importance of using Split-DNS with Office 365

Image of Thomas Stensitzki
Thomas Stensitzki
The use of Office 365 services depends on proper DNS name resolution, especially when running a hybrid configuration. Without a non-functional DNS name resolution, the end user will not be able to connect to Office 365 service from within the company network or from the Internet. Locating of Office 365 services is based on the user's logon name. This logon name (users principal name) is identical to the primary email address. The reasons for keeping the primary email address and the user logon name the same has been covered in detail in a blog post by  Joe Palichario
Read More
modify client access rules

New Client Access Rules for Exchange Online

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

There are many ways you can manage and control the way your end-users connect to Office 365. Intune, and Azure Active Directory Premium are add-on feature sets for your Office 365 subscription that give you advanced controls for managing client access scenarios, but some customers want a lower level of control that they can implement without having to buy add-on licenses.

Read More
Office 365 message encryption

New Features in Office 365 Message Encryption

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

I have long been interested in encryption. I started off my IT career in the United States Marine Corps where I had a Top-Secret security clearance and frequently worked with classified message traffic. During this time, I learned a lot about the rules of encryption and security. Most of what I learned, however, is that encryption is incredibly hard to do correctly.

Read More