This morning on The Official Microsoft Blog, we revealed more details about our enterprise technology conference in May – Microsoft Ignite. If you attended the SharePoint Conference, Exchange Conference, Lync Conference or Project Conference, this is the conference for you. And, if you’re interested in or already using Office 365, this is the conference for you. Register now and we will see you in Chicago!
$account = “domain\user”
$roleName = “FullControl”$webApplication = Get-SPWebApplication -Identity $webApplicationUrl
$account = (New-SPClaimsPrincipal -identity $account -identitytype 1).ToEncodedString()$zonePolicies = $webApplication.ZonePolicies(“Default”)
$policy = $zonePolicies.Add($account, $account)
$role = $webApplication.PolicyRoles.GetSpecialRole($roleName)
1. Check your email provider’s site for information.
Most email providers like Yahoo, Google and Microsoft will have online instructions on what do to in case of an account takeover.
Yahoo Mail has a links entitled “I can’t access my account” on the front page; for Microsoft’s Outlook.com, it’s “Can’t access your account?”
Google has separate sets of instructions for “Compromised Gmail account” and “Someone is sending from my address” in the Security & Privacy section under Help.
2. Call your email provider to report the incident.
“If [the website FAQ] doesn’t work for you, call [the company] directly and ask to speak to their tech department to find out what you should do,” said Adam Levin, former director of the New Jersey Division of Consumer Affairs and the founder of Credit.com and Identity Theft 911.
You should also report the incident to your email provider’s security team, Levin said.
“Do this as you’re in the process of getting your email account back,” he said. “It can help them find a pattern they can use with law enforcement to help find the people who are doing it — although the problem is usually the people who are doing it are 17 countries removed.”
3. Alert family, friends and acquaintances.
“You should tell people that your email has been hacked and that they might be receiving emails from you asking for money or promoting certain products or services — but they weren’t really from you,” Levin said.
“You also have to deliver the bad news,” he added. “If, by some chance, they actually clicked on whatever the [hackers] sent, it is not inconceivable that there might have been malware attached to it.”
Both you and all the persons who have received emails from your hijacked account should run malware scans, Levin said.
4. Examine your personal email settings.
Your email hijackers might have created forwarding policies from your email address to other addresses. Those other email addresses will receive everything you receive — including bank statements and personal messages.
“Even if you get back in your email and straighten everything out, unbeknownst to you, it is forwarding every email you are sending and receiving to the hacker,” Levin said.
Look at your email account’s signature settings to be sure the hacker hasn’t changed your automatic signature.
“Check to make sure you signature block hasn’t become ‘Hello Kitty,'” Levin said. “They might have put some malicious links in there as well.”
5. Change your password and user ID.
“If you are one of those people who believes in a universal password and user ID, it is time to revise your beliefs,” Levin said.
“Change your password and user ID on all the other sites where you’ve used your email password and user ID — and use different ones for each site,” he said. “You have to change them up. Make them long and strong, and use alphanumeric passwords and user IDs.”
6. Look in your email folders.
“It’s a wonderful, eye-opening experience” to look in your email folders, “because you’re going to see things you forgot you had in there,” Levin said.
“And when you see them,” he said, “you will delete them and delete anything that leads to another site — and then change the user ID and password associated with those other sites.”
7. Get serious about monitoring your other accounts.
If your email account has been hijacked, you may find that a little paranoia is a good thing, Levin said.
“That means look at your credit reports, go to sites where you can get your credit scores for free, and where you can go back every 30 days or so, and make sure there is no change — especially a negative change — in your score,” Levin said.
“Look at your bank accounts, your credit card accounts, a couple minutes a day,” he added. “If you’re really worried, then you should enroll in more sophisticated credit- and fraud-monitoring programs.
“You should also check with your insurance company, bank, credit union [and] employer to see if they have a program available that you may already be enrolled in, or [that] you can spend a few dollars and enroll in,” Levin said. “You decide whether it’s worth it or not.”
When you are trying to delete a verified domain name in Office 365, an error comes saying that some users or Office365 services are still attached to the domain.
How to Solve?
- Make sure that no users are associated with the domain that you are trying to delete. Verify this by going into Users And Groups, and Edit a user. Confirm that the domain you are trying to remove, example microsoft.com, is not listed.
- No security groups/distribution groups have the accounts attached to microsoft.com. Security groups/distribution groups can be access by login to Office 365, click on Users And Groups, and select Security Groups.
- If you have just deleted the users, or changed the domain for each individual users, you will need to wait for a while as it need to sync the changes to the different Office365 service settings.
- If the accounts are uploaded to Dirsync, you need to stop the Dirsync synchronization to change the accounts to a Cloud Only account. Then, you need to do above steps to delete the Security groups or manually modify the e-mail addresses in Office 365, Exchange Online.
Let me explain what is it, what are the benefits and then proceed to explain how to enable, configure and manage it via GUI and PowerShell…
Multi-Factor Auth is a multiple validation system that allows us to fortify the security when accessing out system, but not just that, it also allows us to know when someone is trying to access our data and be able to notify as fraud the undesired access. All this with the simple use of an SMS code, telephone call, mobile phone call or via APP.
Is that means that we have to input a code each time to access my mailbox?
Not exactly, unless you select the send message or call options, our installed APP will be the one in charge to notify us that access request and be able to answer if we authorize or decline it.
What happens with each program on which a make use of my account, will I have to authorize them each time they try to access my data?
Nope, we have the option to configure a unique “APP Password” for every program with a unique activation.
Does that means we can create as many APP Passwords I want?
Nope, we have a 40 APP Passwords limit.
What programs we can use with my APP Password?
We can make use of known programs like Microsoft Outlook, Microsoft Lync, Office 2013 suite, and some others like Lync mobile client, Windows 8 and 8.1 Mail APP or the Office365 Activation assistant.
What is the name of the APP that I can use to authenticate the access?
This feature is available for all of the Office365 plans?
Nope, Just for Midsize, Enterprise (E1, E3 and E4) and Standalone (Exchange Online and SharePoint Online) plans, so no Small Business plans are supported.
For organizations that do not want to manage their own SharePoint environment but want to take advantage of what SharePoint provides, Microsoft offers SharePoint Online. SharePoint Online is part of Microsoft’s Office 365 solution, which includes hosted versions of SharePoint, Exchange Server, Lync, and the Office client programs maintained and managed by Microsoft. SharePoint Online is available on a subscription model, in progressive subscription levels that allow selection of the service level that best maps to the needs of the organization.
An organization using Office 365’s SharePoint Online can work with and manage its SharePoint solutions without the responsibility of managing a SharePoint infrastructure. This service, however, comes with some functionality limitations concerning the types and depth of custom solutions that can be created on the platform and the types of third-party solutions that can be leveraged.
As with locally hosted SharePoint, these capabilities are used to create solutions that bring people, information, systems, and business processes together, and SharePoint Online offers the same wide range of capabilities listed in the last section.
The capabilities of SharePoint allow you to create solutions to support your organization’s business needs in a way that is cost effective, can be easily managed, and allows the SharePoint environment to become your central system for managing and accessing enterprise systems and information.