You probably have heard or read about the current issues with chips and their vulnerability.

A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug.

CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre)  are two nasty exploits and you might want to check your systems if they are patched.

Luckily the Microsoft Security Response Center has released a PowerShell module named SpeculationControl which can be installed from the PowerShell Gallery.

Additionally maybe look at Mike’s post

 

So you are in a hybrid environment and moved your Public Folders to o365 but suddenly 3rd party people can no longer send you emails?

Yeah… try this:

 

Trying to block zip files with O365 seems a little painful, as the default GUI does not really give you the option (anymore?) If you Google, you might find screenshots with options to select the attachment but when I checked our GUI, that was all that I saw:

Clearly, there is no option to look for attachments, other than what the attachments CONTAIN.

So, trying PowerShell, something interesting happened.

Executing this PowerShell command, it created a new rule, that now had more/different options than the rule you could create from the GUI!

Look at this:

And now you can block file extensions and stuff to your heart’s content.

Oddities ¯\_(ツ)_/¯

We had a $user who deleted ALL emails from a shared mailbox and you might notice that the option to recover deleted items is grayed out and you cannot select it.

We need to set a registry key to turn that option on.

Create a new DWORD value with the name ‘DumpsterAlwaysOn’ and a value of 1.

Easy via PowerShell:

You have to close Outlook and start it again and voila, you can restore items.