Summary Microsoft is enhancing Conditional Access enforcement for policies that target All resources, including those with exclusions. Sign-ins from client applications requesting only basic directory scopes will now be fully evaluated. The rollout begins March 2026 and continues through June 2026; organizations should review policies and custom apps for requirements like MFA…
Blog Summary With the Windows update released on or after January 13, 2026, Microsoft is deprecating RC4 encryption for Kerberos authentication. As part of this change, AES encryption will be gradually enforced for all accounts, except those explicitly configured to use RC4. To avoid authentication issues, organizations must plan and…
Summary Microsoft introduces Unified Tenant Configuration Management (UTCM) APIs in Microsoft Graph, enabling admins to monitor and detect configuration drift across multiple Microsoft 365 workloads. This brings native tenant-wide drift monitoring for easier governance and improved compliance. As the Microsoft 365 ecosystem grows, keeping tenant settings aligned with the intended configuration becomes…
Blog Summary As the legacy Reporting Web Services will be deprecated by April 6, 2026, Microsoft is extending Graph API support to the new Message Trace feature starting in late January 2026. This provides a modern, REST-based experience for accessing message trace and message trace details programmatically. Plan your migration…
Summary Microsoft updates licensing to extend access to advanced capabilities in Teams and Places without requiring a Teams Premium license. This update removes exclusive barriers, giving organizations easier access to intelligent tools for managing workspaces and events without added licensing complexity. For years, Teams and Places have quietly grown into powerful…
Organizations are rapidly moving toward passwordless authentication using passkeys in Microsoft Entra ID. This approach replaces traditional passwords with cryptographic credentials bound to a user’s device, enabling sign-ins that are secure and seamless. This prevents common credential-based attacks such as phishing, password spraying, and brute-force attempts. Now, Microsoft is taking…
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!