M365 - Exchange Online Center

ENow Software's Microsoft Exchange Online blog built by Microsoft MVPs for IT/Sys Admins.

Posts about:


woman seated at home using laptop

What We've Learned Working Remote Over the Past 8 Months in 2020

Image of Jeff Guillet MVP, MCSM
Jeff Guillet MVP, MCSM

It’s no secret that the IT landscape has changed dramatically over the past 8 months. Due to the pandemic, organizations have had to pivot overnight, and what was hoped to be a short-term problem has turned into the new normal. This applies to the way these organizations deal with their customers, employees, and business partners.

Read More
Authentication Key

Conditional Access for Office 365

Image of Matthew Levy
Matthew Levy

Azure Active Directory Conditional Access has been around since 2016. Conditional Access governs access to cloud resources by evaluating the conditions associated with the sign-in of a user or application accessing a resource. Conditional Access policies allow an admin to stipulate under what conditions certain actions are enabled. I like to think of them as If-then statements.

Read More

Deploying Outlook Mobile Securely in the Enterprise

Image of Dominik Hoefling MVP
Dominik Hoefling MVP
At Microsoft Ignite 2018 last year, Ross Smit IV, Microsoft’s Principal PM Manager in the EEM Customer Experience Engineering team ran a groundbreaking session on deploying Outlook mobile securely in the enterprise. In his Ignite session, he discusses how to meet high security and compliance demands without compromising productivity or the end user experience. In this blog, I am going to recap the session and inform how you can keep company data safe with Enterprise Mobility + Security (EM+S).
Read More
Configurations screenshot

EMS Security Overview

Lawrence Novak

The security perimeter has changed dramatically over the last 5 years. The landscape has gone from a tightly controlled on-premise environment to data, identities, and devices being spread across on-premise and several cloud systems. How can you protect your data and identities while using a spectrum of on-premise and cloud applications and devices? How do you monitor and identify threats? How can you quickly identify the pre and post-breach of systems across on-premise and the cloud? 

Read More

Reply or Reply All: Controls, Options, and Best Practices

Image of Jeff Guillet MVP, MCSM
Jeff Guillet MVP, MCSM

Since the dawn of email, organizations have struggled with the way that users reply to emails. Confusion (or worse) occurs when emails include groups, CC, BCC, internal, and external recipients. Choosing to use "Reply All" may release confidential information to the wrong people or cause mail storms between senders and recipients – sometimes bringing email servers to their knees.

Read More