☁️What’s on my mind
A few days ago I was preparing the material for a webinar on Microsoft 365 Defender for Business. The deeper I dug, the more excited I got about what it will offer SMBs, especially in relation to Microsoft 365 Lighthouse, which will allow managed service providers to manage the security of all their customers who have at least one Business Premium license.
Microsoft is becoming a superpower in endpoint security.
Have a really great day.
💻 Productivity & Modern Workplace
Microsoft Teams Breakout Rooms 101. A step-by-step breakdown of how to set up and use Microsoft Teams breakout rooms. Screenshots included.
Top 5 features of Microsoft Lists. The author of this blog post summarizes the top 5 favorite features of Microsoft Lists. Lists is a gem among other M365 services.
Excel Keyboard Shortcuts EVERYONE should know. Very instructional video covering Excel keyboard shortcuts everyone needs to know. These are the shortcuts you will need on a daily basis.
What is the message length limit for Microsoft Teams chat? Ever wondered how much text you can put in a single. Someone measured it. Check it out.
Microsoft Teams users can now chat with any Teams user outside their organization. Seamlessly collaborate with external customers and partners within the safety and security of your trusted Teams workspace.
☁️ Sysadmin Stuff
The Complete Office 365 and Microsoft 365 Licensing Comparison. An excellent blog post was forwarded to me this week by a colleague. It really is worth its weight in gold.
Find Shared Mailboxes with License using PowerShell. This blog post helps to get shared mailboxes with license and remove unnecessary ones. And thus, you can reduce the licensing cost or assign it to new users.
☁️Security & Data Governance
Unboxing Defender for Business, Part 2: Threat & Vulnerability Management. Microsoft Defender for Business catalogs newly discovered vulnerabilities that are installed across your endpoints and reports that information back to the cloud, and that means Microsoft is able to monitor for these vulnerabilities in near real-time.
How to configure MFA methods for Azure AD. Sometimes Microsoft’s official documentation is not very clear. The author clarifies one of these shortcomings, i.e. how and where to configure MFA methods.
Using Defender for Endpoint to protect your network devices. Did you know that added benefit of Defender for Endpoint is its ability to scan and report vulnerabilities with your network devices, routers, switches, etc?
💻 Noteworthy (long)reads
The making of Fluent emoji. That’s how new emojis were created.
5 Reasons Why Microsoft and Google Are Dominating the Cloud Suite Space. Just think about it. Isn’t it the case that Google and Microsoft are actually the only two companies that offer so many productivity tools for the modern workplace? How did this happen?
The Sample. A whole new way of discovering interesting email newsletters. Sign up and you will get sample newsletters based on the interests that you’ve tagged.
😂 On a Less Serious Note
☁️ Last but not least …
Here are a few things you can do if you enjoyed reading this newsletter: