Disable Office 365 Groups Creation: Redux

Several months ago, I wrote a blog on Disabling Office 365 Groups.  It seems as though we couldn’t leave well enough alone.  Such is a price of progress. I got a new laptop a few weeks ago, and then found myself in the position of helping out a few colleagues this week.  One of the tasks…

13

Office 365 Administration Inside Out

I meant to post this earlier, but I wanted to let everyone know that I’ve had the great honor of being able to write a book with some of the titans of Microsoft Consulting Services.  The book has all new content for Office 365 based on our experience in the field, and even features current…

2

Update to the Office 365 Proxy PAC tool

The people have spoken. I’ve updated the tool with a couple of features: Include the Skype for Business IP ranges in the proxy bypass list, since there are occasions that it is necessary. Added an option for *all* IP ranges in the XML feed for selected products to be added to the proxy bypass list…

1

BitTitan MigrationWiz Resource Migrations Revisited

A while ago, I wrote about a script that I had built for creating BitTitan MigrationWiz connectors with the parameters necessary to do bulk resource mapping.  This worked pretty well, until I downloaded the newest version of the PowerShell module when I had to do it for a customer that was already partway through their…

0

Managing Content Searches in the Security & Compliance Center

Recently, a customer asked for clarification on the difference between Content Search (Security & Compliance center | Search & investigation | Content search) and the Content Search feature in an eDiscovery case (Security & Compliance center | Search & investigation | eDiscovery).  The answer: nothing. Well, almost nothing. In the context of how they work,…

0

WannaCry/WannaCrypt and other Ransomware

This past week has seen the widespread growth of the WannaCry ransomware attack, which was based on the EternalBlue SMB vulnerability.  We released security update MS17-010 on March 14, 2017 to address the vulnerability. Preliminary reports show at least 300,000 computers have been affected globally by this ransomware that encrypts files, requiring up to $600…

3

Copy Get-History to Clipboard

I’ve been working on a little project, and the need to retrieve the last n number of commands I’ve executed in PowerShell has become a tedious task.  As you’re (hopefully) aware, Get-History is a great cmdlet to review exactly how you got to where you are.  You can then combine that with the Clip cmdlet…

4

AADConnect Undocumented Filters

From time to time, you may find that you need to selectively filter out users going to Office 365.  The easiest way to do it is with a scoping filter.  We do have some documents on setting the cloudFiltered attribute in the metaverse to True, but that requires creating new rules.  And, if you’re in…

1

Migrating Hybrid Public Folders to Office 365

So, tonight I started the last phase of one of my longest-running projects since joining Microsoft–an Exchange Online migration for a school district that I began nearly a year and a half ago.  40,000 mailboxes down and 13,000 public folders remaining. One of the things that we recommend for Hybrid Public Folders is that you…

12

AAD Connect Error CD-8235 Exporting to AD Connector

This afternoon, I ran into a customer with a very interesting configuration–a 300-user department with 15 domain controllers spread among 6 sites. Which, given our guidance in the past didn’t seem that out of line (redundant domain controllers at each site to process logons). What made it really interesting was that each site (including the…

3