The Common Attachment Types Filter

The Common Attachment Types Filter is a feature that was rolled out to Exchange Online earlier this year. If you haven’t opened your malware filter for a while, you may not even know this new filter is there! With this filter, you no longer need to create transport rules to block file types as attachments…


Create a Custom Management Role for Granular Permissions in Exchange Online

Creating custom management roles can be very powerful, and they not nearly as complicated as one might think. Most clicks in Office 365 actually cause a PowerShell cmdlet to run in the background. With a custom management role, you can specify right down to which cmdlets you would like a user to have access to….


Take Action Yourself on Blocked IPs and Banned Senders in Office 365

I have recently found that many organizations are unaware that they can take action on their own when it comes to blocked IPs and banned senders in Office 365. For both of these cases, a web based portal exists that can be used to remedy the problem, eliminating the need to create a support case…


Interesting case where Exchange is not installed on-premises

I’ve recently been working on projects as opposed to cases, and so I haven’t had anything too exciting to write about lately. However, I recently worked a case that I found quite interesting and wanted to share it here. I believe this is an edge case, but makes for an interesting problem none the less….


Interesting Exchange Online articles from the year so far

After being out of the office for four months, there is a lot I need to catch up on! Over the past couple of weeks, I’ve been reading through articles going over what all has changed in Exchange Online and Office 365 during my time away (January to May of this year). I have complied…


Introducing Spoof Mail Reports

The following article was written by Rob McCarthy who is a Business Program Manager for Readiness in Microsoft. Spoofing continues to be a top concern for any security conscious email administrator today. Generally, there are two spoofing scenarios that administrators must devote thought to… An organization is receiving spoofed messages from a malign source asking…


I’m back!

Hi all, thank you for the kind comments on my last post where I talked about being away from work. I’m back at work now and will be posting to this blog again on a regular basis. I’ve missed writing here and am excited to resume the knowledge sharing and discussions. There is a bit of…


Where’s Andrew?

It’s been just over two months since my last story and about time I post an update here. Since early January I’ve been on a medical leave from work which is the reason this blog has become so quiet. I’m not sure when I’ll be back at work yet, but when I do I’ll be…


Bulk editing of Safe Sender lists

The following article was written by Richard Deprez who is a Support Escalation Engineer for Exchange Online at Microsoft. Recently I have seen an increase in phishing attacks coming through EOP due to safe sender aggregation (email addresses that have been added by end users to their safe senders list will be respected by EOP,…


Top blog posts from 2015

It’s the last day of 2015 and I thought it would be interesting to look back on the top blog posts of this year. When thinking about this past year, the first topic that comes to mind is Spoofing/Phishing, and anti-spoofing technologies like SPF, DMARC, and DKIM. These types of attacks continue to be heavily…