Quantcast
Channel: AdminDroid Blog
Browsing all 149 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Connect to Exchange Online with Certificate

In today’s cloud-driven world, securing access to critical Microsoft 365 business resources like Exchange Online is crucial. While traditional username and password combinations have served us well,...

View Article


Image may be NSFW.
Clik here to view.

Application Security in Microsoft 365 – Common Guidelines

In today’s digital world, the importance of application security in Microsoft 365 cannot be overstated, especially as administrators struggle with protecting sensitive data. To effectively safeguard...

View Article


Image may be NSFW.
Clik here to view.

Send M365 Password Expiration Notification via Power Automate

The online world is constantly evolving, and with it, the threats to your organization’s data. Securing your Microsoft 365 environment requires a multi-layered approach, but strong passwords remain...

View Article

Image may be NSFW.
Clik here to view.

Tool for Office 365 Reporting by AdminDroid is now on Azure Marketplace  

Exciting News! AdminDroid Microsoft 365 Reporting Tool is Now Available on Microsoft Azure Marketplace   Today, we are pleased to announce the availability of AdminDroid Microsoft 365 reporting tool...

View Article

Image may be NSFW.
Clik here to view.

Manage Device Identity Settings in Entra ID 

By default, all users can join devices to Microsoft Entra ID. This poses significant risks, such as unauthorized access from private computers. Therefore, managing these device settings is crucial to...

View Article


Image may be NSFW.
Clik here to view.

Free Password Expiration Notification with Follow-up Emails in Power Automate

Statistics show that password-related issues are among the most common helpdesk calls. Implementing an automated process can reduce helpdesk call volume and associated costs. In our previous blog, we...

View Article

Image may be NSFW.
Clik here to view.

Happy Sysadmin Day: Celebrating the Real Saviors of CrowdStrike Outage

Hola Sysadmins! It’s been a long, exhausting week, hasn’t it? You were probably counting down to celebrate ‘SYSADMIN(YOUR) DAY’, but the universe had other plans and threw you into huge trouble!...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Auto-Archives Unlicensed OneDrive Accounts 

Microsoft 365 Archive, previously a SharePoint essential, now turns its attention to OneDrive! Microsoft’s new Archiving feature, meant for long-term storage of inactive content, is now charging you...

View Article


Image may be NSFW.
Clik here to view.

How Microsoft Entra Private Access Replaces VPNs and Improves Security 

Cyber-attacks are on the rise, and traditional security measures just aren’t cutting it anymore! With employees working from virtually anywhere and data moving to the cloud, there’s an urgent need for...

View Article


Image may be NSFW.
Clik here to view.

Block Self-service Purchases Using Microsoft 365 Admin Center 

Microsoft has fixed the headaches admins encounter with PowerShell in handling self-service purchases! Soon, Global admins will have access to a new section called “Self-Service trials and purchases”...

View Article

Image may be NSFW.
Clik here to view.

Configure Adaptive Protection Integration with Data Lifecycle Management to...

As cyber threats evolve, organizations face increasing challenges, especially with data sabotage attacks where data is intentionally disrupted or deleted, causing significant damage and high costs....

View Article

Image may be NSFW.
Clik here to view.

How to Create Access Packages in Microsoft Entra

As harmful threats increase, every organization must implement Microsoft 365 security best practices to prevent severe cyber-attacks. Admins should do their utmost to secure the organization’s...

View Article

Image may be NSFW.
Clik here to view.

Configuration Analyzer in Microsoft Defender 

Cyberattacks are becoming increasingly sophisticated, making it challenging for organizations to maintain robust security defenses in Microsoft 365. To effectively protect against these threats, a...

View Article


Image may be NSFW.
Clik here to view.

What If Tool to Test Conditional Access Policies in Entra ID

Conditional Access policies in Entra ID operate as simple “if-then” statements designed to manage and secure user access within your organization. For example, a policy might state, “If a user tries...

View Article

Image may be NSFW.
Clik here to view.

How to Set Up Mandatory MFA for All Users’ Entra Sign ins 

With cyber threats advancing at an unprecedented rate, safeguarding user accounts has been more critical. Imagine a world where each login is protected by an added security layer, significantly...

View Article


Image may be NSFW.
Clik here to view.

Continuous Access Evaluation in Microsoft 365 Admin Center 

Exciting news for organizations focused on security! Starting September 2024, Microsoft extends support for Continuous Access Evaluation (CAE) to the Microsoft 365 admin center. This feature ensures...

View Article

Image may be NSFW.
Clik here to view.

Top 15 Vulnerabilities in Microsoft 365 

Confident your Microsoft 365 environment is secure? You might be overlooking some risks! Even the most sophisticated security systems can have their blind spots. While Microsoft 365 offers powerful...

View Article


Image may be NSFW.
Clik here to view.

Discover the New Copilot Updates and Monitor Adoption Trends

Microsoft has recently announced their launch of Microsoft 365 Copilot Wave 2, featuring interesting updates and enhancements to existing functionalities. As we all know, Microsoft Copilot leverages...

View Article

Image may be NSFW.
Clik here to view.

How to Enable Windows LAPS in Entra ID 

Local administrator accounts are a key part of managing Windows systems. They allow users to make important changes, like installing software or adjusting settings. But with great power comes great...

View Article

Image may be NSFW.
Clik here to view.

Configure Authentication Strength for External Users in Conditional Access

With organizations becoming more collaborative with external users, the need to secure access to critical resources becomes paramount. Without the right safeguards, sensitive information shared with...

View Article
Browsing all 149 articles
Browse latest View live