Quantcast
Channel: blog.atwork.at

Image may be NSFW.
Clik here to view.

Impact of the CrowdStrike Windows 10 BSOD

As reported in most media, we would like to inform you about a global outage caused by a erroneous software update from cybersecurity company CrowdStrike today, on July 19th. This Endpoint security...

View Article


Image may be NSFW.
Clik here to view.

Delegate365-Disable MFA Legacy

In Delegate365, there exist two methods to configure Multi Factor Authentication (MFA) for users: the functions “Authentication methods (MFA)”, and “MFA (Legacy)”. See the difference here, and how to...

View Article

Image may be NSFW.
Clik here to view.

Retrieve User PIM Role Assignments and History with Microsoft Graph REST API

Microsoft Entra Privileged Identity Management (PIM) allows administrators to manage role assignments efficiently, ensuring that users have the necessary permissions only when needed. By following a...

View Article

Image may be NSFW.
Clik here to view.

Grant permissions to the GT365 app

Our Governance Toolkit 365 (GT365) provides information and automation solutions for a Microsoft 365 tenant. In order to use the functions, this app must be approved by an administrator. In addition,...

View Article

Image may be NSFW.
Clik here to view.

Why Only Users Can Apply Sensitivity Labels in Microsoft 365

Sensitivity labels in Microsoft 365 are a crucial feature for organizations to protect and manage their data. These labels allow organizations to classify and safeguard sensitive information based on...

View Article


Image may be NSFW.
Clik here to view.

Use Delegate365 with Privileged Identity Management (PIM)

In today’s digital landscape, managing privileged access to applications is crucial for maintaining security and compliance. Microsoft Entra Privileged Identity Management (PIM) offers a robust...

View Article

Image may be NSFW.
Clik here to view.

Unlocking Secrets: The Key Vault Role You Need

In my use of Azure Key Vault with code and flows with Managed Identities, I moved to role-based access control (RBAC) to manage access to secrets and certificates. However, I encountered a problem when...

View Article

Image may be NSFW.
Clik here to view.

Useful SharePoint search expressions

When working with files in SharePoint document libraries, there are many ways to filter files. Since I keep forgetting the syntax for the search queries, I have summarized the most important filter...

View Article


Image may be NSFW.
Clik here to view.

Setup the CoE using Azure Key Vault

In today’s rapidly evolving digital landscape, maintaining visibility and control over your organization’s M365 Power Platform environment is crucial. The Center of Excellence (CoE) for the Microsoft...

View Article


Image may be NSFW.
Clik here to view.

Introducing the new and improved Delegate365: A modern SaaS solution for...

We are thrilled to announce the launch of the latest version of our Software-as-a-Service solution, Delegate365 (delegate365.com). This brand-new iteration is designed to provide a faster, more modern,...

View Article