Hi All, I did feel to write a simple PowerShell Script to demonstrate how to Send a Mail via Microsoft Graph. You need to create an Azure AD Application with the following Permission "Application -> Mail.Send". Authentication with a SelfSigned Certificate. The whole Script is published at my GitHub Repo https://github.com/BohrenAn/GitHub_PowerShellScripts/blob/main/ExchangeOnline/GraphAPI/SimpleGraphSendMail.ps1
###############################################################################
# Limiting application permissions to specific Exchange Online mailboxes
# https://docs.microsoft.com/en-us/graph/auth-limit-mailbox-access
#
# Limit Microsoft Graph Access to specific Exchange Mailboxes
Hi All, I don't check daily if there are any new PowerShell modules in PSGallery. So i wrote me a Script of my most used Modules to Inform me if there are any new Modules available. With the following Code i check for the current Version of the Modules and put them into a PSCustomObject with the Attributes Release, Module, Version (for GA and Prerelease Versions).
###############################################################################
# Check PSGallery Modules
Hi All, It's that time of the Month again and Microsoft has released Patches for Exchange 2013 up to Exchange 2019
Released: March 2022 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-march-2022-exchange-server-security-updates/ba-p/3247586 Description of the security update for Microsoft Exchange Server 2019 and 2016: March 8, 2022 (KB5012698)
https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-and-2016-march-8-2022-kb5012698-440c5421-dc0e-448f-93ef-4e686c18f7c3
Security Update For Exchange Server 2016 CU22 (KB5012698)
https://www.microsoft.com/en-us/download/details.aspx?id=103999 Don't forget to start the msp from an elevated cmd Prompt
Regards Andres Bohren
Hi All, I was inspired to look a little bit deeper into the Update Mechanism of Microsoft Teams by the "Teams MSI Override" GitHub Project. You can check your Version in Teams by Settings > Info > Version
Then the current Version and update Date is shown in the top bar
You can invoke a update check in Settings > check for updates
Then Teams will search for updates
I've traced this Action in Fiddler
Hi All, Over a Year ago i did wrote a Azure Automation Script to check your M365 Licenses.
Check your M365 Licenses with Azure Automation
https://blog.icewolf.ch/archive/2021/04/18/check-your-m365-licenses-with-azure-automation.aspx I did rewrite that code to support Microsoft Graph for query the Licenses and also send the Mail via Microsoft Graph. Setup Environement I first created a new AzureAD Application (just to make a clear separation of Graph Permissions for the purpose of this Demo).
Hi All, Release Notes and Download
https://github.com/microsoft/PowerToys/releases/
There is a new Activation method for "Find my Mouse" by Shaking it. I've tested it and you have to shake quite hard. I'll stick with the "Press Left Control twice".
Regards Andres Bohren
Hi All, VMware published a Security Advisory for the VMware Tools on Windows.
VMSA-2022-0007
https://www.vmware.com/security/advisories/VMSA-2022-0007.html
VMware Tools 12.0.0 Download
https://customerconnect.vmware.com/en/downloads/details?downloadGroup=VMTOOLS1200&productId=1259&rPId=85322
On my ESXi the VM's the VMware Tools are currently running Version 11.3.5
I've extracted the "windows.iso" and renamed it to "WMwareTools12_Windows.iso"
Then uploadet it to the Datastore
Attached it to the VM
And started the setup64.exe
Regards Andres Bohren
Hi All, Recently there was an Annoucement in the M365 Message Center that announced the depreciation of the Get/Set-PhishFilterPolicy. Move to the new Commands
Get-TenantAllowBlockListSpoofItems New-TenantAllowBlockListSpoofItems Set-TenantAllowBlockListSpoofItems Remove-TenantAllowBlockListSpoofItems The Get-PhishFilterPolicy will soon be depreciated
Get-PhishFilterPolicy | ft Sender, SpoofedUser, NumberOfMessages, DecisionSetBy, AllowedToSpoof, SpoofType
To see only the entrys, that are allowed to Spoof
Get-PhishFilterPolicy | where {$_.AllowedToSpoof -eq "Yes"} | ft Sender, SpoofedUser, NumberOfMessages, DecisionSetBy, AllowedToSpoof, SpoofType
Instead use this Command now
Hi All, As many of you i use a lot of Copy & Paste when creating Emails. By default, the Format of the Source will be used - but did you know that you can change that?
These are the default Settings
If you select and copy a few Lines from a Website
This will happen - and you need to use the Paste Context Menu to select "Text only"
Hi All
I have tested the Azure Cost Management anomaly detection Preview.
Public preview: Cost Management anomaly detection for subscriptions
https://azure.microsoft.com/en-us/updates/preview-cost-management-anomaly-detection-for-subscriptions-2/
Regards Andres Bohren