As cyber threats rise, it’s becoming harder than ever to trust the emails we receive, right? So, Microsoft gave us several built-in security features such as SPF, DKIM, and DMARC protocols to prevent phishing and email spam, but still, some malicious emails manage to slip through the cracks! 🫤 Therefore, to add additional security, Microsoft introduced external…
All posts in General
How to Create Self-signed Certificate using PowerShell
As an administrator, ensuring secure communication over networks is a top priority. One way to achieve this is by using secure certificates. While CA-signed certificates (issued by a trusted third-party organization) provide a high level of security, they can be expensive and may not be necessary for all use cases. In such scenarios, a self-signed…
ChatGPT: The New Partner for Sysadmins to Build, Fix, and Test Solutions
As I turn everywhere, all my social media feeds are full of ChatGPT, popping up everywhere. 🚀ChatGPT has been a great success ever since its beta phase! With the attention and traffic, many people have been testing ChatGPT for its efficiency and have been impressed by its multi-purpose potential, such as generating AI-written copies, solving…
Important Microsoft 365 Articles Every Sysadmin Should Never Miss Out On!
You must have had a long holiday, right? ❄️However, the holiday season might be over, but that doesn’t mean the celebrations must! With the new year in full swing, it’s time to make a fresh start and set new goals. And the best way to kick off the new year is to ensure that your…
A Guide to Microsoft 365 Forensic Investigation
On Day 31 of Cybersecurity awareness month, learn how Microsoft helps in forensic investigation and where to find the forensic artifacts today. Stay tuned for more blogs in the Cybersecurity blog series. As Cyberattacks are arising day-by-day, every organization needs to be secure enough to fight against them. Besides all the security measures, attackers can still enter…
Mailflow Status Reports to Secure Microsoft 365 Emailing Process
On Day 27 of Cybersecurity awareness month, learn to monitor and secure your emailing process by keeping track of the Microsoft 365 mailflow reports. Stay tuned for more blogs in the Cybersecurity blog series. As we all know, users are prone to spam and malware attacks, with which the organization’s data is bound to be breached and this leads…
Microsoft 365 Alerting – Detect and React to Threats Instantly
On Day 22 of Cybersecurity awareness month, learn to utilize the Microsoft 365 alerting to effectively secure your organization today. Stay tuned for more blogs in the Cybersecurity blog series. Should admins stay up to date? Do they really need to know what’s going on in the organization? Of course, yes! Nowadays, cyber threats are…
Prohibit Unmanaged Devices Accessing SharePoint and OneDrive to Prevent Data Exposure
On Day 15 of Cybersecurity awareness month, learn to protect your organizations’ data from unmanaged devices today. Stay tuned for more blogs in the Cybersecurity blog series. Every organization wants to protect its data securely from cyber criminals. For securing data, the organization implements various security measures, enforces policies, and more. Coming to Microsoft 365,…
Tag and Protect Priority Accounts in Microsoft 365 – Prioritize Your Priorities!
On Day 12 of Cybersecurity awareness month, learn to use priority accounts as tags today. Stay tuned for more blogs in the Cybersecurity blog series. CISCO’s 2021 Cybersecurity threat trends report suggests that at least one person clicked a phishing link in around 86% of organizations. The company’s data suggests that phishing accounts for around 90% of…
A Guide to SPF, DKIM, and DMARC to Prevent Spoofing
On Day 11 of Cybersecurity awareness month, learn to secure your domain from being spoofed today. Stay tuned for more blogs in the Office 365 Cybersecurity blog series. Nowadays, impersonation attacks like phishing, spoofing, etc., have become more common. As the usage of third-party tools has become massive, there are more chances of our identity…