Microsoft GCC High compliance

Why having a Microsoft GCC High environment doesn't limit you to Microsoft Office 365 native admin tools

0 Comments7 Minutes

One of our customers had a large client base of federal agencies and would be handling certain types of Controlled Unclassified Information (CUI)…

Read More

How to summarize office 365 admin audit logs

How to Create an Entra ID Activity Summary Report from Microsoft Office 365 Admin Audit Logs

0 Comments10 Minutes

In this article, we’ll look at creating Microsoft 365 reports summarizing the various admin activities done in Entra using the data from Office 365…

Read More

IT admin with log office 365

The Savvy Admin's Guide to Audit Logs in Office 365

0 Comments30 Minutes

Many IT admins who are managing their organization’s Office 365 environment need more information about the activities occurring in their…

Read More

how to get office 365 license assignment dates from Audit Logs

What you need to know about Microsoft Office 365 Audit Logs and Office 365 license assignment dates

0 Comments10 Minutes

We recently published a blog on how to check Microsoft Office 365 license assignments. In this blog we explained several methods to obtain this…

Read More

How to reset office 365 passwords

How to Reset Office 365 Passwords in Bulk

0 Comments8 Minutes

With cybersecurity issues on the rise, many organizations are being more vigilant with password security. If your company has had a recent security…

Read More

How to revoke office 365 access

How to revoke Microsoft Office 365 access in bulk

1 Comment7 Minutes

From time to time, organizations may have a situation where the IT admin is asked to block certain users from Microsoft Office 365 access. For…

Read More

How to remove guests from Microsoft 365 Teams in one click

How to remove guests from Microsoft 365 Teams in one click

0 Comments4 Minutes

Microsoft 365 Teams are not just conversation hubs, they act as storage spaces for sharing information among people with common goals and projects.…

Read More

Microsoft Office 365 multi factor authentication

Removing Weak Microsoft Office 365 Multi Factor Authentication Methods

0 Comments4 Minutes

A large part of an IT admins’ responsibilities is to make sure that users can sign in securely using approved Microsoft Office 365 multi factor…

Read More

How to find and eliminate Microsoft Office 365 multi factor authentication gaps

How to find and eliminate MFA gaps in Microsoft 365

0 Comments7 Minutes

Finding security gaps is often a task that falls into the lap of a company’s IT department. Ensuring that users have implemented strong Microsoft…

Read More

licenses

A Mini-Tutorial to Giphy Blocking in Microsoft Teams

0 Comments4 Minutes

Allowing the use of Giphys in Teams is risky business these days! First it was the occasional offensive gif that would slip through Giphy’s…

Read More

mail forwarding rules

Best way to find and remove mail forwarding rules in Exchange Online

2 Comments8 Minutes

Part of the Microsoft 365 offboarding process involves securing your work environment from data leaks. One such component involves eliminating…

Read More

documents-shared

How to report on documents ‘shared with guest’ or ‘shared with anonymous’

0 Comments4 Minutes

Office 365 with SharePoint, Teams and Onedrive is great for sharing information and documents. But this must be managed properly to maintain…

Read More

sharegate-classification

Edit and report all site classifications in SharePoint Online

0 Comments2 Minutes

Site classifications can be used to define the sensitivity of the data within your site, and help automate the management of all sites with the same…

Read More

site-classification

SharePoint site classification made easy

0 Comments2 Minutes

When creating a modern site in Sharepoint, you can select the type of classification you want – including for Groups and Teams. Site classifications…

Read More

eyes-secure-environment-deciphering-facets

All eyes towards a secure environment: Deciphering facets of modern IBM Notes and Domino encryption through Ytria tools.

5 Comments21 Minutes

IBM Domino, the secure platform that it is, provides you with a full range of encryption options to cover data stored on Domino servers or user…

Read More