Entra ID

PowerShell Email Domain Migration Guide

    Overview: This comprehensive guide provides PowerShell commands for migrating email domains in hybrid Microsoft 365 and Active Directory environments. The scripts cover updating User Principal Names (UPNs), managing Exchange Online mailbox addresses, and configuring Active Directory proxy addresses.   Table of Contents Prerequisites Step 1: Update User Principal Names (Microsoft Graph) Step 2: …

Register Application in EntraID – Using PowerShell

In today’s digital landscape, automating processes is an essential part of increasing efficiency and maximizing productivity. In this blog post, I will introduce you to a powerful PowerShell script that greatly simplifies the registration of applications in Microsoft 365. This script provides a complete solution that not only automates app registration, but also generates a …

Unveiling an unexpected behavior in ConditionalAccess: Unable to enforce controls for some Apps

Recently, an unexpected problem popped up with some ConditionalAccess policies: it is not possible to enforce controls. Applications show up as ‘excluded’ from the targeted resources when ConditionalAccess policies are evaluated. This behaviour allows users to access resources without MFA or compliant devices. This is possible for Applications which use Entra ID as Idp or …

Recommendation – Microsoft 365 authorization concepts – Part 2

This article is a continuation – i.e. Part 2 – of the article Recommendation – Microsoft 365 authorization concepts – Part 1. In this article, the following topics are now dealt with to complete the start for understanding an authorization concept: Configuration of Exchange online RBAC at Administrative Units level Configuration of automatic users, guests …

The Rising Cybercrime Threat and the Imperative of Robust Password Policies

In today’s digital landscape, businesses are increasingly grappling with the repercussions of cybercrime. Cyberattacks are escalating in frequency, and the resulting damage is growing at an unprecedented rate. Among the most significant vulnerabilities for organizations are their passwords, which serve as the entry point into an account and, consequently, represent the weakest link in their …

Recommendation – Microsoft 365 authorization concepts – Part 1

Microsoft 365 administrators have various roles and tasks that they need to manage to ensure that the organization runs smoothly. Authorization concepts that are familiar from the on-premise world cannot be replicated 1:1 in the Microsoft Cloud. In order to ensure data security, several steps need to be implemented. These are as follows:   PIM: …

Naming convention suggestion

Creating a standardized and consistent naming convention for IT infrastructures based on Microsoft 365 and Microsoft Azure is essential for efficient management. The following guidelines should be adhered to: General Principles: Consistency: Maintain consistency across all resources, ensuring a uniform and predictable structure. Readability: Names should be easy to read and understand, avoiding unnecessary abbreviations. …