M365 Weekly Newsletter
☁️What’s on my mind
Even when I was an inexperienced and young system administrator, say 20 years ago, I used to hear at conferences how dangerous administrator rights can be if ordinary users have them. In my job at the time, I decided to put an end to that.
And I did a stunt, which, thankfully, had a happy ending.
I burned the autorun script onto some CDs. This sent all the passwords stored in Internet Explorer to me by e-mail. Of course, this only worked on computers where the users had administrator privileges.
I also wrote an attractive title to the disks – something like “Employee Payroll 2003”. I then “lost” these CDs around the company, and simply waited a couple of days.
You can’t imagine the carnage that ensued in the company when it became clear what I had done.
Fortunately, the director supported me. Employees no longer resisted restrictions on their user rights as much. Purpose achieved.
I did not lose my job. Today I probably would have.
Have a really nice rest of the week,
☁️Productivity & Modern Workplace
3 Ways to Use Forms in Your Business from Polls to Recruiting + AI Features Revealed! Microsoft Forms can be utilized in 3 impactful ways, whether in a corporate setting or your own business. In this step-by-step tutorial you’ll find out about the potential of surveys, quizzes, and polls for gathering crucial insights.
How to use Microsoft Loop app. Microsoft Loop is the next-generation cocreation experience that brings together teams, content, and tasks across your apps and devices. Learn how to use it.
Sending Attachments as Links in Outlook. Gone are the days of chasing people for their input on a document and dealing with countless duplicated content in email attachments, thanks to the incredible advancements in co-editing technology. Share links instead of attachments. I am convinced that sending email attachments is the biggest abuse of mail systems there is.
How to only search for contents of the files in SharePoint Online. Discover a nice trick to narrow down your search to focus on what truly matters! A step-by-step guide to mastering the art of efficient searching in Sharepoint Online.
☁️ Sysadmin Stuff
Why Azure AD License Assignment Dates Can Mislead. Have you ever wondered exactly when a user account was granted a license? The answer may not be as straightforward as it may seem.
Join Button Not Working In Teams. What is the culprit and how to fix it? I came across this article when I was looking for information for a colleague about why Teams call links don’t work. This time it really isn’t Microsoft’s fault.
How to whitelist domain or service in Exchange in Office 365. Sometimes you really have no choice but to whitelist an email address to avoid the constant questions about why certain messages are going to spam.
SharePoint File Size Limits Explained. Sharepoint limits have changed considerably over time. Most of the time for the better. I still remember the days when over 5000 files in a document library were a serious problem.
☁️Security & Data Governance
Zero-hour Auto Purge in Exchange Online. ZAP is a real-time email protection feature in Exchange Online that detects and removes spam and malware messages from your Office 365 mailbox, even if the threats are weaponized after delivery. It helps Microsoft 365 organizations proactively eliminate malware messages that may have bypassed traditional email filtering techniques, safeguarding email communication channels.
Getting started with Microsoft Tunnel for Mobile Application Management for Android. Tunnel for MAM is one of the features that was released at the beginning of March as part of the Intune Suite add-ons. Tunnel for MAM provides IT with the flexibility to make an app, with on-premises interaction, available on personal-owned devices.
Onboarding a passwordless Azure AD user. FIDO2 security keys have revolutionized the way we approach online security by enabling passwordless authentication, greatly reducing the risk of phishing attacks and other forms of cybercrime. They are easy to use, affordable, and can be used across various platforms, making them a popular choice for many individuals and businesses looking to enhance their digital security.
DevOps threat matrix. DevOps practices are rapidly growing in popularity. They help companies deliver software more efficiently, but there’s a catch – attackers are also getting more interested in these environments. Some high-profile attacks have shown the devastating consequences of successful breaches. That’s why it’s crucial to secure code before deployment and protect DevOps environments.
What runs ChatGPT? Inside Microsoft’s AI supercomputer. Don’t miss this exclusive behind-the-scenes video.
The Sample. A whole new way of discovering exciting email newsletters. Sign up and you will get sample newsletters based on the interests that you’ve tagged.
☁️On a Less Serious Note
☁️ Last but not least …
Here are a few things you can do if you enjoyed reading this newsletter: