Tenant-to-Tenant – PST based Exchange Migration automation approach – Part II

In Part I of this series (Tenant-to-Tenant – PST Exchange Migration automation approach – Part I – thinformatics blog) I’ve described how to prepare a PST-based migration by exporting mailbox settings into XML files. The next task is to export PST’s from the source. In our case, I’m talking about an Exchange Tenant-to-Tenant migration. So… Weiterlesen Tenant-to-Tenant – PST based Exchange Migration automation approach – Part II

Ignite Impressionen: Microsoft Entra Workload Identities

In der Ignite Session “Introducing Microsoft Entra Workload Identities” (gehalten von Grace McNamara, Etan Basseri und Stefan van der Wiele) wurde publiziert, dass die Identity und Access Management Lösung „Workload Identities“ im November 2022 allgemein verfügbar sein wird. Mithilfe dieser Microsoft Entra Komponente werden neue Möglichkeiten eröffnet Accounts und Berechtigungen zu verwalten die typischerweise für… Weiterlesen Ignite Impressionen: Microsoft Entra Workload Identities

Use more Access Packages!

Microsoft Teams & Azure AD Access Packages = BFF ?! Hi, the more I am using Azure Active Directory Entitlement Management and Access Reviews, the more I am impressed by the possibilities of Identity Governance. The challenges which I am confronted with every day, these are especially Governance, Compliance and Security Topics round about M365,… Weiterlesen Use more Access Packages!

Showcasing some Endpoint Detection & Response Features of Microsoft Defender ATP

This week I have built a simple scenario for a customer PoC to demonstrate some EDR features of Microsoft Defender Advanced Threat Protection. The idea is to show in a simple to deploy and easy to understand scenario how threats can be detected with Advanced Hunting how custom detections can be turned into alerts how… Weiterlesen Showcasing some Endpoint Detection & Response Features of Microsoft Defender ATP

Advanced Conditional Access Use Cases – Part 2: Controlling the actions in a session

After my introduction to Policy Design for Conditional Access and the integration of Risk Based Conditional Access I would like to deal with the first session controls today. While all other policies so far were concerned with the question of whether an access is allowed or not, session controls define conditions within the access or… Weiterlesen Advanced Conditional Access Use Cases – Part 2: Controlling the actions in a session