PowerShell – Office 365PowerShell command reference – Detailed

Manage Send As Permissions using PowerShell – Office 365

The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based environment, we can…

Details
Mail migration CutoverMail migration to Office 365

Office 365 Cutover mail migration – Exchange on-Premises pre requirements

The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for each Exchange on-Premises…

Details
E-mail SecurityPhishing E-mailSpoof E-mail

Dealing with a Spoof mail attacks and Phishing mail attacks | A little story with a sad end | Part 1#9

In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story is also known…

Details
E-mail SecurityPhishing E-mailSpoof E-mail

What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9

We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail attacks realized. The…

Details
E-mail SecurityPhishing E-mail

What is the meaning of mail Phishing attack in simple words? | Part 4#9

In the current article, we will continue our journey to the land of “mail threats and dangers,” and this time; our primary focus will be on one of the most dangerous and deadly types of mail attack – the Phishing mail attack! The main points that I would like to emphasize regarding Phishing mail attack…

Details