social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.9K
active users

#o365

0 posts0 participants0 posts today

Bit of "fun" with O365 email for us this week...

Background: Our main email domain's MX records are on-prem servers that do a bunch of things, and email for our O365 domain relays through them. These on-prem MX servers have been dual-stack (ipv4 and ipv6) for many years now.

Not sure exactly when MS made various changes, but our example-com.mail.protection.outlook.com records have both ipv4 (A) and ipv6 (AAAA) addresses.

And they enforce that email they receive has to be via a "trusted connector" for your domain, pass SPF, or pass DKIM.

> 450 4.7.26 Service does not accept messages sent over IPv6 [dead::beef::1] unless they pass either SPF or DKIM validation (message not signed)

But O365 doesn't yet support adding ipv6 IPs/ranges to the trusted/connector list.

So, suddenly email sent to us without DKIM signatures was getting stuck in the MX server queues.

Our temporary workaround is we added egress firewall rules on the MX servers themselves blocking SMTP to 2a01:111:f400::/48 and 2a01:111:f403::/48 (the published ranges for their MX servers). Not ideal, but at least mail is flowing again.

Nel magnifico settore informatico in Italia, ma anche in altri paesi, abbiamo potuto assistere alla corsa a fare adottare #Office365 ai clienti. Il ragionamento era: io, piccolo provider, non riesco a offrire servizi concorrenziali rispetto a quelli di #Microsoft per cui giro su #O365 le mail e faccio la cresta sulle licenze e la gestione del tenant e offrendo assistenza quando gli utenti hanno gli attacchi d'ira causati da #Outlook. Inutile dire, che un modello di business fondato sul fare la cresta non è esattamente un modello sostenibile a lungo periodo. La premessa di tutto questo era la convinzione che MS non avrebbe aumentato a dismisura i prezzi delle licenze. E quindi via a spostare i propri clienti verso O365 magnificando a questi le sorti magnifiche e progressive della centralizzazione dei sistemi di posta
1/continua

Anyone here understand how the instructions for connecting #Powershell to #O365 #Exchange online? learn.microsoft.com/en-us/powe
When I get to step two, it opens a browser, I enter my credentials (I'm already signed in on the web, fwiw), and then immediately redirects me to localhost on port 52781, which seems to have nothing listening on it. Am I supposed to have some sort of server running on my local machine to respond after the redirection? Did I miss a step?
#MSOffice #Outlook #Office365

learn.microsoft.comConnect to Exchange Online PowerShellLearn how to use the Exchange Online PowerShell V3 module to connect to Exchange Online PowerShell with modern authentication and/or multi-factor authentication (MFA).

Kurze Frage an die Runde: Wer war von euch betroffen? Hab in meinen Ferien davon mitbekommen und auch Rücksprache mit meiner Vertregung genommen. Aber es schien wohl keine Probleme gegeben zu haben. Nur ein US Problem gewesen? :mastoshrug:

: -Angriff schuld an weltweiter Cloud-Störung | heise online heise.de/news/Microsoft-DDoS-A

heise online · Microsoft: DDoS-Angriff schuld an weltweiter Cloud-StörungBy Dr. Christopher Kunz

Read That Before You Trust Anything by #Microsoft Once Again
karl-voit.at/2024/07/17/Micros

This is no secret in the #ITsecurity bubble. However, it was not covered properly in general media: #MS #security is crushed & is unlikely to be re-established.

Unless they provide more information, this covers also #Windows authentication (via MS account), #Azure, #O365 & more or less all other services & software products.

public voit - Web-page of Karl Voit · Read That Before You Trust Anything by Microsoft Once AgainRead That Before You Trust Anything by Microsoft Once Again

Has anyone seen an uptick in BEC through phishing emails in the past two weeks?

A user receives a phishing email from a known contact (who was compromised), the phishing email usually says that the sender shared a document or invoice. When the user clicks the link they are sent to an O365 login page in a Evilgnix type proxy.

The user enters their credentials and 2FA push and the attacker starts the whole process again.

@thunderbird@mastodon.online @thunderbird@tilvids.com So… is anyone keeping tabs on #Betterbird? I can’t say I’m fond of everything they’ve done, but in the world of “we care about using Graph with #O365 #Exchabge” this is starting to gain steam. I’m resisting g the fork, but I’m curious what the team has to say on the subject.

Indeed the latest round of chat revolved around a version of #TbSync hacked to talk to #GraphAPI.