Category: Blog

SharePoint visible to unlicensed users

31st December, 2018

As the title says there is a little known ‘feature’ in SharePoint.  Basically SharePoint has no licence associated with it.  Any users created in your Azure AD will have access to SharePoint as along as the SharePoint permissions allow it.  So if you use the All Users excluding Guests then even an unlicensed user in […]

Merging Two Office 365 Mailboxes

2nd October, 2018

There are many reasons why you may want to do this but probably the most likely is the “Leaver” scenario.  A common way of dealing with leavers is to simply convert their Mailbox to a Shared Mailbox and then terminate the user account.  (Sometimes, but not very often these days, it is exported to a […]

New Application Guard Window in the Edge Browser

27th September, 2018

Every now and then you receive an email with a URL in it that makes you pause and think.  Maybe it’s from a colleague or a friend, and almost looks legit, but something is telling you it might not be.  Maybe you are doing your own research on a subject matter that may lead you […]

FindTime – by Microsoft

27th September, 2018

Booking a meeting?  Need to find available times? We work with a multitude of different clients from the pre-sales process, thru to implementation and project closure.  Very often there are many stakeholders but getting everyone together at a time that suits is often tricky.  Every attempted scheduled meeting takes precious time, be it through calling […]

Using a Virtual Mobile Phone for Shared Multi-Factor Authentication

2nd July, 2018

As an IT support organisation, we pride ourselves on staying up to date as much as possible with current trends and changing technologies, particularly in the Microsoft space.  As such we keep a keen eye on technical blogs, whitepapers, LinkedIn articles, Twitter, Microsoft Office 365 notifications and of course we are part of the Microsoft […]

Offering Remote Help in Windows

26th June, 2018

One of our clients recently asked to present all their options for Remote Support to their end-users.  This organisation, like many others is always keen to keep costs down and has opted not to use a third-party solution, but instead to leverage existing native tools. To that end we put together a list of the […]

Find differences between two GPO templates

25th June, 2018

If you’ve been dealing with Group Policy Objects (GPO) for any length of time you’ll know that when a new version of the ADMX templates are released there are often no release notes as to what has changed.  If you’re lucky you’ll find the occasional blog that tells you what may be some of the […]

Mobile number not syncing via AAD Connect

22nd June, 2018

Very brief observation from us today. A customer complained that the mobile attribute was not syncing from their local Active Directory to Office 365/Azure Active Directory – even though AAD Connect was reporting the attribute changes…. It turns out, that this is one of the only attributes editable directly on Azure Active Directory / Office […]

Technical Limitations of Migrating IBM Domino Rooms to Exchange

21st June, 2018

Recently we observed an issue with Domino Rooms that we migrated to Exchange/Office 365.  In short, appointments contained within cannot be cancelled or re-scheduled and always remain as zombie reservations (unless manually cleaned up). Coexistence This is addition to coexistence issues experienced with Rooms.  You have to set Microsoft Rich Text to disabled for the […]

Paying it forward…

19th June, 2018

Paying it forward… Well, not really, just plain old IT email forwarding. We all (Messaging Admins) have used forwarding extensively, but it struck me that there are several ways to achieve the same thing.  Most often the forwarding scenario comes up during the following scenarios: Coexistence (mergers / acquisitions / divestitures) Upgrades (migrating to a […]

Inside Kerberos – 7: Wrap up

17th May, 2018

Alright, we’ve covered a lot of ground, but let’s wrap up by grabbing our original questions and answering the 1. Why is there a problem with SIDHistory and Domain Local Groups, and exactly what is the problem? We’ve seen that Domain Local groups can have sid-history applied from one domain to another, this allows for […]

Inside Kerberos – 6: Conversations

10th May, 2018

We have covered a lot of ground so far, and we have touched on the Kerberos conversations that go on, but let’s take a deeper look at exactly how these messages are made up and how they are protected. Elements to protect the transmission Secret Keys Secret keys are stored inside the Security Account Manager […]