M365 - Exchange Online Center

ENow Software's Microsoft Exchange Online blog built by Microsoft MVPs for IT/Sys Admins.

Posts about:

Microsoft

Microsoft Defender listing image

Using Defender for Cloud Apps to Control File downloads

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

One situation I see often with customers is the desire to control and monitor file downloads from the cloud. For most organizations in most industries, it’s important to control your organization's data, and that data is often contained in files. The proprietary nature of information in files makes them very valuable to many organizations, and thusly important to control.

Read More
Configurations screenshot

EMS Security Overview

Lawrence Novak

The security perimeter has changed dramatically over the last 5 years. The landscape has gone from a tightly controlled on-premise environment to data, identities, and devices being spread across on-premise and several cloud systems. How can you protect your data and identities while using a spectrum of on-premise and cloud applications and devices? How do you monitor and identify threats? How can you quickly identify the pre and post-breach of systems across on-premise and the cloud? 

Read More
Microsoft Intune

A look at Microsoft Intune

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

Intune was born as Microsoft’s Cloud based Mobile Device Management platform. Since then, it has grown into a management platform for both mobile devices and P.C.s. Intune can now manage iPhone, Android, Windows Phone, and some versions of Windows. It’s clear that Microsoft intends to grow Intune into a complete cloud-based device management platform.

Read More
Screen Shot 2017-07-16 at 10.30.01 PM.png

The New Microsoft 365

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM
Microsoft introduced a new product, or at least a new SKU, at Inspire (the new name for the Microsoft partner conference), It's called Microsoft 365. This new product is a combination of two existing products, and the first "cloud" version of Windows 10. In this blog post, I'm going to look at Microsoft 365. What it is, what it costs, how you'll use it, and if you want it at all.
Read More
computer code

Enabling DKIM in Exchange Online

Image of Nathan O'Bryan MCSM
Nathan O'Bryan MCSM

Spam is the bane of all messaging administrators, as well as a major pain for all email users. Using email means a consistent battle against spam, malware, and unwanted nonsense flooding your inbox. There are a number of different tools and tactics we, as administrators, can use to reduce the impact of these attacks and recently Microsoft has added another one to the toolboxes of Office 365 customers. In this blog post I'm going to explain what DKIM is, and how you can use it to help make the world a safer place for legitimate email messages.

Read More
Hybrid listing image

Hybrid Headache: Hybrid mailbox moves and the “expect 100-continue” header

Image of Michael Van Horenbeeck MVP, MCSM
Michael Van Horenbeeck MVP, MCSM

A little over two years ago, I wrote about an issue I encountered with a KEMP load balancer and how Microsoft performs hybrid mailbox moves. More specifically, the issue evolved around a seemingly different interpretation between KEMP and Microsoft regarding the implementation of the expect 100-continue header. As I noted then, the workaround was to configure the KEMP load balancer to ignore the 100-Continue rules as described in RFC 2616.

Read More