SaaSHub helps you find the best software and product alternatives Learn more →
Orca Alternatives
Similar projects and alternatives to orca
-
office365
Repo for containing and managing office 365 scripts for my customers, techs and others. If you have any questions please feel free to hit me up.
-
Export-RecipientPermissions
Document, filter and compare Exchange permissions: Mailbox access rights, mailbox folder permissions, public folder permissions, send as, send on behalf, managed by, moderated by, linked master accounts, forwarders, sender restrictions, resource delegates, group members, management role group members
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
hawk
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches (by T0pCyber)
-
Set-OutlookSignatures
The open source gold standard to centrally manage and deploy email signatures and out-of-office replies for Outlook and Exchange
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
vsteam
PowerShell module for accessing Azure DevOps Services and Azure DevOps Server (formerly VSTS or TFS)
orca reviews and mentions
-
Nuclear Spam Option
Look into running an ORCA report and see what it flags: https://github.com/cammurray/orca
- Anybody else having issues with anti-spam and phishing policies ??
-
How to block malicious emails with spoofed display names impersonating internal company's department email addresses (XYZ HR Department) coming from an external email address in Microsoft 365 Exchange/Defender?
I highly recommend reviewing this if you haven't already: https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-protection-basics-in-microsoft-365-spoof-and-impersonation/ba-p/3562938. If you have all of the Impersonation features enabled, you can greatly reduce the risk of future impersonation emails getting through. You can quickly run the ORCA or the Configuration Analyzer tool in Defender to see if you're behind on best practices. I've seen this work very well in orgs that were previously big red targets for BEC.
- O365 security
-
Thoughts on Microsoft Defender for Office 365 (ATP)?
If you are going to use it, I highly recommend utilizing Cam Murray's ORCA Module to review your settings against Microsoft's recommended settings (assuming you have appropriate coverage to manage and are not expecting it to be a set it/forget it solution.)
-
Defender best practices?
Use ORCA. https://github.com/cammurray/orca
- Does anyone have a cheat sheet for hardening up spam and phishing policies in o365?
-
A note from our sponsor - SaaSHub
www.saashub.com | 26 Apr 2024
Stats
The primary programming language of orca is PowerShell.
Sponsored