2022 End-of-Support Milestone in Microsoft 365
This blog lists Microsoft 365 technologies, services, and products that are going to expire in 2022. So that you can adopt or migrate to new technology.
We love to solve IT administrators’ challenges.
This blog lists Microsoft 365 technologies, services, and products that are going to expire in 2022. So that you can adopt or migrate to new technology.
Microsoft 365 usage reports show anonymous ids for users, groups, and sites by default from September 1, 2021. This privacy update helps organizations comply with local privacy laws. Microsoft Makes Privacy Changes to Microsoft 365 Usage Analytics (MC275344): How Does It Impact Your Organization? Microsoft reporting indicates that one or more users in your organization use or have access to…
This blog describes the efficient way to manage your SharePoint Online environment through AdminDroid SharePoint Online reporting and auditing tool.
Manage your organization’s mailboxes with Exchange Online reporting tool by AdminDroid. Get 170+ pre-built mailbox reports on size, usage, email traffic, auditing, etc.
This blog describes MFA configuration methods and ways to get Office 365 users’ MFA status report with and without PowerShell.
The blog has the list of Office 365 services, products, and technologies that are going to expire in 2021. The list includes both end-of-support and deprecation
This blog will help you to setup and identify email forwarding configuration. Detecting and preventing external email forwarding in Office 365 environment.
It’s time to thank our super heroes of IT – Our System Administrators! Happy System Administrator’s Appreciation Day.
It’s been three months since the first Coronavirus case was confirmed in China. Since then, the virus has gone on a world tour, striking country after country in both hemispheres. The events that have unfolded as a result are truly tragic. To look on the brighter side though, the pandemic has given us the time…
Cybersecurity and Healthcare have a lot in common which isn’t immediately visible to the average eye. Take, for instance, the ‘Response Plan’ in case of an incident. Identification of the breach is usually the first step in case of a cybersecurity incident. This is followed by containment, eradication, and recovery. Similarly, a Health incident response…