Posted inBlog
How to access Attack simulation training (PREVIOUSLY Attack Simulator) within Office 365
Microsoft has a habit of constantly changing the location of items within the Security center…
A Cyber Security Blog.
How to force mobile devices to use the Outlook App instead of their native apps.
Some useful scripts to change calendar permissions via Powershell with efficiency and very little effort.
How to use powershell to search user mailbox and shared mailbox forwards within your tenant for security purposes.
How to search the mailbox rules on your tenant per user, via Powershell. Great for finding what rules have been setup via the Client/Webapp.
Office 365 is widely used however, is rarely configured to best practices which can allow a multitude of attacks/exploitation.
Use this security hardening guide.