Microsoft 365 News
2025 End-of-Support Milestone in Microsoft 365
This blog highlights the Microsoft 365 services, products, and technologies set to be deprecated in 2025. Admins can plan for necessary steps.
5 min read
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!This blog highlights the Microsoft 365 services, products, and technologies set to be deprecated in 2025. Admins can plan for necessary steps.
5 min read
Learn to delete phone authentication for Microsoft 365 users via Entra admin center, MS Graph PowerShell, and a all-in-one PowerShell script
7 min read
Learn to allow external sharing for specific SharePoint sites in Microsoft 365 using a all-in-one PnP PowerShell script
6 min read
Learn to track secure score changes in Microsoft 365 to avoid accidental misconfigurations and secure your Microsoft 365 environment.
5 min read
Learn to improve Microsoft identity secure score with three crucial Microsoft settings and safeguard your organization's identity.
6 min read
Admins can block self-service purchases from an user-friendly UI found in Microsoft 365 admin center.
3 min read
Use Entra workbook to monitor Microsoft 365 sign-ins, where you can audit Azure AD and AD FS sign-in activity and troubleshoot login issues easily.
7 min read
Use Conditional Access insights and reporting workbook in Entra ID to monitor Conditional access policies impacts in Microsoft 365.
9 min read
Use the risk-based access policies workbook in Entra ID to analyze the impact of risk-based conditional access policies based on user/sign-in risk scenarios.
8 min read
Organizational messages in Microsoft 365 admin center is currently in public preview, helps you send short, customized messages to users within M365 products.
6 min read
Learn to use the multifactor authentication gaps workbook in Entra ID to find users without MFA in Microsoft 365 and applications lacking MFA requirements.
7 min read
The Conditional Access gap analyzer workbook helps identify gaps like users without any CA policies applied, missed named locations, legacy authentication users
8 min read