Microsoft 365

Configuring Microsoft 365 to Use a Custom Domain Name

Configuring Microsoft 365 to Use a Custom Domain Name

Most organizations have a domain name that corresponds to the name of their business. If your organization uses Microsoft 365, it’s possible to replace the default onmicrosoft.com domain name with a custom one of your choosing. This article walks you through the configuration process and shows you how to register a custom domain name if you don’t already have one.

Why Do PowerShell-Based Exchange Online Cmdlets Often Fail?

Why Do PowerShell-Based Exchange Online Cmdlets Often Fail?

Microsoft has long recommended a “PowerShell first” approach to management, but this might be difficult in a Microsoft 365 environment. Cmdlets often fail because of improper permissions. This article explains how you can check for the permissions required to use an individual PowerShell cmdlet.

How to Prevent Microsoft 365 From Purging Old Messages

How to Prevent Microsoft 365 From Purging Old Messages

Few things are more unsettling than finding Exchange Online has automatically removed a message you wanted to keep. If this happens, it could be because Exchange Online has moved the message to an archive mailbox. It’s also possible that Exchange Online has deleted the message. This article explains how you can use a retention policy to prevent that from happening.

When Exchange Mailbox Archives Fail to Sync

When Exchange Mailbox Archives Fail to Sync

Exchange Online often moves older messages to an archive mailbox to prevent a user’s inbox from being filled to capacity. Although archive mailboxes are normally reliable, Outlook sometimes has trouble opening them. Learn the potential causes and how you can fix them in this article.

How Ransomware Could Attack Microsoft 365

How Ransomware Could Attack Microsoft 365

In spite of Microsoft’s best efforts, ransomware attacks can sometimes successfully encrypt data in the Microsoft 365 cloud. This is especially true for data stored in SharePoint Online and OneDrive for Business. This article explains how these attacks work and some precautionary steps that you can take.

Scroll to Top