Freshly brewed with Microsoft Azure and Microsoft 365

Author: Oliver Müller Page 2 of 8

Deploying Azure Naming Tool on a docker container

The Azure Naming Tool is a free tool for docker container that always generates the correct name for an Azure resource based on best practices.

Microsoft has provided guidance on the various phases in the cloud adoption strategy in the Cloud Adoption Framework. These guides also include best practices for naming Azure resources. Naming is extremely important, but it is also very extensive. As a result, many ambiguities or errors can arise when naming resources.

This guide describes the installation and configuration of Azure Naming Tool step-by-step on a Docker container.

Azure AD B2B Direct Connect for shared channels in Microsoft Teams

Microsoft offers with Azure AD B2B Direct Connect for shared channels in Microsoft Teams a feature that simplifies management for collaboration with external partners in teams.

Until the release of Azure AD B2B Direct Connect, an external partner was invited to the tenant as a guest and authorized in Microsoft Teams (Azure AD B2B Collaboration). The external partner then received an email with instructions for further steps.

When looking in to the own Azure Active Directory everyone notes: each external user gets a guest account in our own Azure Active Directory. Whether the guest account is still in use or not, it will always remain in Azure Active Directory until it is manually deleted.

cmd.ms Microsoft Cloud command line for the browser

Finding the right blade in the Microsoft portal can be time-consuming and complicated. With cmd.ms exists a Microsoft Cloud command line for the browser. This can be used to access specific portals and blades such as conditional access, MFA (multi-factor authentication), quarantine emails and many more directly from the browser address bar.

Exchange Online: Mail encryption with Information Rights Management (IRM)

Confidential information such as contracts, financial reports, employee or customer data is often exchanged via email. These emails are mostly not encrypted. With Information Rights Management (IRM), encrypted emails can be sent and received between people inside and outside your organization. Sent emails and their replies are encrypted automatically with transport rules or manually from Exchange Online email client (Outlook and Outlook.com).

Information Rights Management (IRM) ensures that only intended recipients can open and read the message. It is also possible to prevent emails from being forwarded, printed or parts of them copied. Message encryption works with Outlook, Outlook.com, Gmail and many other popular email services.

Page 2 of 8

Powered by WordPress & Theme by Anders Norén