Export-RecipientPermissions
orca
Our great sponsors
Export-RecipientPermissions | orca | |
---|---|---|
1 | 7 | |
16 | 272 | |
- | - | |
3.9 | 7.9 | |
6 days ago | 2 months ago | |
PowerShell | PowerShell | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Export-RecipientPermissions
-
Export-RecipientPermissions
Export-RecipientPermissions can help you with all these tasks. Get your free copy at https://github.com/GruberMarkus/Export-RecipientPermissions.
orca
-
Nuclear Spam Option
Look into running an ORCA report and see what it flags: https://github.com/cammurray/orca
- Anybody else having issues with anti-spam and phishing policies ??
-
How to block malicious emails with spoofed display names impersonating internal company's department email addresses (XYZ HR Department) coming from an external email address in Microsoft 365 Exchange/Defender?
I highly recommend reviewing this if you haven't already: https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-protection-basics-in-microsoft-365-spoof-and-impersonation/ba-p/3562938. If you have all of the Impersonation features enabled, you can greatly reduce the risk of future impersonation emails getting through. You can quickly run the ORCA or the Configuration Analyzer tool in Defender to see if you're behind on best practices. I've seen this work very well in orgs that were previously big red targets for BEC.
- O365 security
-
Thoughts on Microsoft Defender for Office 365 (ATP)?
If you are going to use it, I highly recommend utilizing Cam Murray's ORCA Module to review your settings against Microsoft's recommended settings (assuming you have appropriate coverage to manage and are not expecting it to be a set it/forget it solution.)
-
Defender best practices?
Use ORCA. https://github.com/cammurray/orca
- Does anyone have a cheat sheet for hardening up spam and phishing policies in o365?
What are some alternatives?
hawk - Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
office365 - Repo for containing and managing office 365 scripts for my customers, techs and others. If you have any questions please feel free to hit me up.
PowerShell - PowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
PSBucket - PowerShell scripts that relate to blog articles I write on iphase.dk, msendpointmgr.com or technet gallery.
atproto - The AT Protocol (🦋 Bluesky) SDK for Python 🐍
PowerShell - My PowerShell scripts. Use at your own peril
oh-my-posh2 - A prompt theming engine for Powershell
Microsoft-Extractor-Suite - A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
Set-OutlookSignatures - The open source gold standard to centrally manage and deploy email signatures and out-of-office replies for Outlook and Exchange
EWS-Office365-Contact-Sync - Uses Exchange Web Services to synchronize a Global Address List in Office 365 to a user's mailbox
posh-git - A PowerShell environment for Git