Exchange Online

Looking at Microsoft 365 Priority Accounts Again

by Tony Redmond

Removing Puzzlement Last month I reported my puzzlement about Microsoft’s announcement of priority accounts. I couldn’t figure out what value these accounts brought to the table, especially as they were targeted solely at tenants with more than 10,000 accounts with more than 50 active Exchange Online users. My report was based on details in a… Read More

Anticipating Microsoft Ignite 2020

by Tony Redmond

Welcome to 48 Hours of Free Technical Content The annual Microsoft Ignite conference for IT Professionals was originally planned to run in New Orleans starting today. Due to the Covid-19 pandemic, Microsoft decided not to run in-person events through June 2021, and consequently Ignite 2020 is now a 48-hour online event run over three days… Read More

What’s the Real Size of Exchange Online Mailboxes?

with 1 Comment by Tony Redmond

The Office 365 Substrate uses Exchange Online mailboxes to store a lot of data that users never see. The data is used by the substrate for different purposes, mostly to make it easier for features to get to relevant information. Microsoft doesn't document exactly what is stored, where it is stored, and how it is used, so we must poke around in the innards of mailboxes to see what we can discover.

How Exchange Online Processes Journal Reports for Protected Email

by Tony Redmond

Office 365 tenants often want to journal email from Exchange Online mailboxes. Things become a little more complicated when protected email is involved, but Exchange can decrypt protected messages and create journal reports with attachments containing the original encrypted message and a decrypted copy. That should be enough for journaling systems to process the journal reports and import messages into their repositories.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: