Assign eDiscovery permissions in the Microsoft 365 compliance center

August 25th, 2021

Link

Assign eDiscovery permissions

  1. Go to https://compliance.microsoft.com and sign in using an account that can assign permissions.

  2. In the left pane of the Microsoft 365 compliance center, select Permissions.

  3. On the Permissions & Roles page, under Compliance center, click Roles.

  4. On the Compliance center roles page, select eDiscovery Manager.

  5. On the eDiscovery Manager flyout page, do one of the following based on the eDiscovery permissions that you want to assign.

    To make a user an eDiscovery Manager: Next to eDiscovery Manager, select Edit. On the Choose eDiscovery Manager wizard page, click Add Icon Add. Select the user (or users) you want to add as an eDiscovery manager, and then select Add. When you’re finished adding users, select Done. Then, on the Editing Choose eDiscovery Manager wizard page, select Save to save the changes to the eDiscovery Manager membership.

    To make a user an eDiscovery Administrator: Next to eDiscovery Administrator, select Edit. On the Choose eDiscovery Administrator page, click Add Icon Add. Select the user (or users) you want to add as an eDiscovery Administrator, and then Add. When you’re finished adding users, select Done. Then, on the Editing Choose eDiscovery Administrator wizard page, select Save to save the changes to the eDiscovery Administrator membership.

 

UniFi – Layer 3 Adoption for Remote UniFi Network Applications

July 17th, 2021

If you can SSH into the device, it’s possible to do L3 adoption via CLI command:

Disable UAC (User Account Control) in Windows

May 5th, 2021

C:\Windows\System32\UserAccountControlSettings.exe

Powershell

Set-ItemProperty -Path registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name EnableLUA -Value 0 

 

Enable Automatic External Forwarding for Individual Mailboxes

April 16th, 2021
Log in to your Office 365 Security & Compliance portal for Microsoft 365 and choose Threat management > Anti-spam or head directly to the Anti-spam settings page here: https://protection.office.com/antispam.

2
Click + Create an outbound policy.

3
Give your new outbound spam filter policy a Name and Description. Click the down arrow next to Automatic forwarding to expand that section. Choose On – Forwarding is enabled from the dropdown.

4
Click the down arrow next to Applied to, then +Add a condition. Choose Sender is from the dropdown list, then click in Add a tag to find the email account(s) you’d like to allow to automatically forward and select them. Click Save.

 

Enable Automatic External Forwarding for All Mailboxes

April 16th, 2021

Log in to your Office 365 Security & Compliance portal for Microsoft 365 and choose Threat management > Anti-spam or head directly to the Anti-spam settings page here: https://protection.office.com/antispam

2Click the down arrow next to Outbound spam filter policy ‎(always ON) and click the Edit policy button.

3Click the down arrow next to Automatic forwarding, then choose On – Forwarding is enabled from the dropdown. Click Save

Lenovo XClarity Controller

April 15th, 2021

Default username and password

User: USERID 

Password PASSW0RD

To disable the password reset functionality – Microsoft365

March 20th, 2021

Azure Active Directory admin Center

To disable the password reset functionality, which is redundant if you have Office 365 federated to RM Unify, please perform the following:

  1. Log on to Office 365 as a global administrator and navigate to ‘Admin center’.
  2. From the left-hand side, select Settings, ‘Security & privacy’.
  3. In the right-hand side pane, click the ‘Azure AD admin center’ link, as highlighted in the image below:
Image showing 'Azure AD admin center' link

  1. In the ‘Azure Active Directory admin center’ window, in the left-hand side, select Users, ‘Password reset’.
  2. Change the ‘Self service password reset enabled’ option to None.
  3. Click Save.
Image showing the 'Self service password reset enabled' option

What are security defaults

March 15th, 2021

Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more and more popular. Security defaults make it easier to help protect your organization from these attacks with preconfigured security settings:

  • Requiring all users to register for Azure AD Multi-Factor Authentication.
  • Requiring administrators to perform multi-factor authentication.
  • Blocking legacy authentication protocols.
  • Requiring users to perform multi-factor authentication when necessary.
  • Protecting privileged activities like access to the Azure portal.

Screenshot of the Azure portal with the toggle to enable security defaults

Azure Active Directory security defaults | Microsoft Docs

Set the default pdf viewer app in Windows 10 command line

March 5th, 2021

SetUserFTA.exe .pdf Applications\Acrobat.exe

SetUserFTA: UserChoice Hash defeated – Set File Type Associations per User or Group on Windows 8/10 and 2012/2016/2019 – the kolbicz blog

Change timestamp on file

February 12th, 2021

(Get-Item “FILE PATH”).LastWriteTime=(“31-12-2021 15:00:00”)