Lately, I’ve been doing a lot of PowerShell scripting, and it’s given me the chance to expand my experience and exposure to best practices. One of the key areas I’ve focused on is logging — something that’s often overlooked but incredibly valuable when troubleshooting or reviewing script performance.
➡️Automating Azure App Registrations with PowerShell
It has been a while since I last blogged - life has certainly been busy!
Over the past two years I’ve somewhat immersed myself in PowerShell. While I wouldn’t claim to be a PowerShell Guru, my knowledge has substantially grown, thanks in part to splendid collaboration with some exceptional colleagues.
➡️How to populate an O365 DG from a Security Group
Having fully migrated our on-prem Exchange to Exchange Online, there were a few little gotchas along the way that we had to contend with - which was to be expected.
➡️How to delete an email from all Exchange mailboxes
It’s not uncommon to receive unwanted emails which have managed to work their way through the array of filtering systems in production. Recently our organisation received such an email - a classic phishing email sent to multiple end user accounts.
➡️Encourage those Windows to restart!
A common issue with supporting a primarily Windows based user body, is that thanks to the “always on” expectation emboldened by smartphones and tablets, it can be a constant battle to try and encourage end users to restart their computers with some degree of regularity - yes IT friends, you know exactly what I mean!
➡️Security should be a first class citizen
Let’s face it, information security is important. With more and more data being stored and accessed via the internet, we are becoming increasingly reliant on “third parties” to secure our personal data responsibly. So how is it that we are seeing so many data breaches and poor practices?
➡️Honeypots to catch prying eyes!
As I have mentioned in previous blog posts, I regularly listen to numerous technical podcasts. A relatively new edition to my listening collection is the information security podcast Risky Business – it’s great!
➡️Office 365, Outlook & attachments
Recently, we received rather confusing claims from specific users, stating they were receiving certain emails, often days after they had been sent. This behavior was not consistent across the user base.
➡️Locked out user email notification
It recently occurred to me, that whilst my current full-time position is an IT Systems Manager, the majority of my blog posts thus far, have been more web centric – which is great, as I love the web and web technologies!
➡️