Freshly brewed with Microsoft Azure and Microsoft 365

Tag: Tutorials Page 2 of 6

Looking for tutorials for Microsoft Azure and Microsoft 365? You can find all our tutorials in this archive.

Deploying Azure Naming Tool on a docker container

The Azure Naming Tool is a free tool for docker container that always generates the correct name for an Azure resource based on best practices.

Microsoft has provided guidance on the various phases in the cloud adoption strategy in the Cloud Adoption Framework. These guides also include best practices for naming Azure resources. Naming is extremely important, but it is also very extensive. As a result, many ambiguities or errors can arise when naming resources.

This guide describes the installation and configuration of Azure Naming Tool step-by-step on a Docker container.

Exchange Online: Mail encryption with Information Rights Management (IRM)

Confidential information such as contracts, financial reports, employee or customer data is often exchanged via email. These emails are mostly not encrypted. With Information Rights Management (IRM), encrypted emails can be sent and received between people inside and outside your organization. Sent emails and their replies are encrypted automatically with transport rules or manually from Exchange Online email client (Outlook and Outlook.com).

Information Rights Management (IRM) ensures that only intended recipients can open and read the message. It is also possible to prevent emails from being forwarded, printed or parts of them copied. Message encryption works with Outlook, Outlook.com, Gmail and many other popular email services.

Disabling Basic Auth: Microsoft 365 SMTP Relay for Non-TLS Devices

As of October 1, 2022, basic athentication (legacy authentication) will be disabled for EWS, RPS, POP, IMAP, MAPI, RPC, OAB, SMTP AUTH, and EAS protocols in Exchange Online. The basic authentication is a big security issue, since a user name and password are already sufficient for sign in. After deactivating basic authentication, modern authentication (based on OAuth 2.0) becomes active. Modern authentication requires a second factor (multi-factor authentication).

Onboarding Microsoft Defender for Business

Microsoft Defender for Business provides holistic security for multiple operating systems. Built-in intelligence ensures immediate detection, defense and response to current threats such as ransomware, malware or pishing. Microsoft Defender for Business is suitable for companies with up to 300 employees.

The rollout of this software within an Active Directory domain is very simple. Here is a step-by-step guide on how to perform the rollout with default settings.

Installation and configuration Azure Active Directory Cloud Sync

Azure Active Directory Cloud Sync is a software that synchronizes objects from Active Directory to Azure Active Directory.
Azure AD Connect cloud synchronization orchestrates the provisioning of AD objects to Azure AD in Microsoft Online Services. Locally only a simple agent is needed.

The entire synchronization configuration is set up in the Azure Portal (https://portal.azure.com). Azure AD Cloud Sync supports high availability by installing the agent on multiple servers.

This tutorial describes how to install and configure Azure AD Cloud Sync.

Page 2 of 6

Powered by WordPress & Theme by Anders Norén