Email Spoofing

Email spoofing is a common technique used by cybercriminals to send fraudulent emails that appear to come from a trusted source. This practice can put individuals and organizations at risk of falling victim to phishing attacks, malware infections, and other types of cyber threats. To prevent email spoofing, several email authentication protocols such as SPF, DKIM, and DMARC have been developed. These protocols work by verifying the authenticity of the sending domain, checking the content of the email, and enforcing policy-based actions. By implementing these protocols, domain owners can protect their brand reputation, improve email deliverability, and provide a safer email experience for their users.

Microsoft Bing Uses AI (Artificial Intelligence)?

Microsoft Bing uses artificial intelligence (AI) in various ways to enhance its search engine capabilities and user experience. Here are a few examples: Query intent detection: Bing uses machine learning models to analyze user search queries and identify the intent behind them. This helps Bing to provide more relevant search results to users. Entity recognition:... Continue Reading →

Script to Get Currently Setup DFS Details

Let's say you want to get a preview of how DFS is setup before you start making any changes. Following script will output the current dfs setup. This script first imports the DFS module using Import-Module DFSR. It then uses the Get-DfsnServerConfiguration cmdlet to get a list of all DFS Namespace servers in the domain.... Continue Reading →

Script to list The Members of Nested Distribution Groups

Connect to Exchange Online PowerShell $UserCredential = Get-Credential$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirectionImport-PSSession $Session Get list of all distribution groups $groups = Get-DistributionGroup -ResultSize unlimited Loop through each group and get its members foreach ($group in $groups) {Write-Host "Group: $($group.Name)"$members = Get-DistributionGroupMember -Identity $group.Name -ResultSize unlimitedforeach ($member in $members)... Continue Reading →

What is ChatGPT?

In layman's terms, ChatGPT is an artificial intelligence (AI) program that is designed to understand and respond to human language. It is based on a sophisticated technology called "deep learning," which allows it to learn from vast amounts of text data and generate natural-sounding responses. ChatGPT is actually a family of models, each of which... Continue Reading →

Mailbox Calendars Permissions For All Users

Following power shell commands can be used to get a list of all Exchange user's mailbox calendar permissions. Output will list all users along with the users that have permission to their calendars and also permission level. $Mailboxes = (get-mailbox -database dbname) $Mailboxes | ForEach {Get-MailboxFolderPermission -Identity “$($_.alias):\Calendar” | Select User, Identity, AccessRights} You can... Continue Reading →

Adding Phone Number To Teams

Recently, we have had issues where we were setting up Apple enrolments on Microsoft Intunes which requires an Apple ID which requires an email address and phone number to verify the identity. Engineers were using their personal phone numbers and when the cert expires after a year, we run into an issue if that Engineer... Continue Reading →

Create a website or blog at WordPress.com

Up ↑