<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>M365 Archive - MEB-IT | Blog</title>
	<atom:link href="https://blog.meb-it.de/en/tags/m365/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.meb-it.de/en/tags/m365/</link>
	<description>Networking &#124; Security &#124; Cloud</description>
	<lastBuildDate>Sun, 26 Mar 2023 10:03:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</title>
		<link>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/</link>
					<comments>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Thu, 16 Mar 2023 19:31:11 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[CVE-2023-23397]]></category>
		<category><![CDATA[M365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=143</guid>

					<description><![CDATA[<p>You might have heard about CVE-2023-23397 a vulnerability targeting Microsoft Outlook. The exploit can be triggered without user interaction. The vulnerability seems easy to exploit. Fortunately, you can simply protect yourself: Update Outlook/Office Apps and you are good. But how can we make sure we have not been exploited by that vulnerability? Microsoft has released [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/">Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You might have heard about <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397" target="_blank" rel="noreferrer noopener">CVE-2023-23397</a> a vulnerability targeting Microsoft Outlook. The exploit can be triggered without user interaction. The vulnerability seems easy to exploit. Fortunately, you can simply protect yourself: Update Outlook/Office Apps and you are good.</p>



<p>But how can we make sure we have not been exploited by that vulnerability? Microsoft has <a href="https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/" target="_blank" rel="noreferrer noopener">released a script</a> for local Exchange installations as well for Exchange Online/ Microsoft 365.</p>



<p>This blog post shows how to use the Script to identify potential malicious mails in M365.</p>



<p>First we need to start Powershell as administrator. After that we install the AzureAD module:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator&gt; Install-Module AzureAD</code></pre>



<p>Powershell will then ask if the module should be installed from an external source. Please select Yes (Y) here.</p>



<p>Next, we need to install the Exchange Online module:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator&gt; Install-Module -Name ExchangeOnlineManagement -RequiredVersion 3.1.0</code></pre>



<p>Powershell will then ask again if the module should be installed from an external source. Please select Yes (Y) again.</p>



<p>The script used in the following step can be downloaded <a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/CVE-2023-23397.ps1" target="_blank" rel="noreferrer noopener">from here</a>.</p>



<p>Now we need to create an AzureAD application, which is needed to check the mailboxes:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; .\CVE-2023-23397.ps1 -CreateAzureApplication</code></pre>



<p>Depending on the Powershell configuration, it may be necessary to confirm again that the script may be executed. You can either chose (M) or (A). I recommend chosing M.</p>



<p>A new window will open to log in to M365 as a global administrator or application administrator.</p>



<p> If your output is similar to the following creating the helper application has worked:</p>



<pre class="wp-block-code"><code>CVE-2023-23397 script version 23.03.15.2119

Prompting user for authentication, please minimize this window if you do not see an authorization prompt as it may be in the background

Adding user adminuser@yourtenant.com as owner of CVE-2023-23397Application

Setting Azure AD Permissions

Assigning Necessary Azure AD Service Roles
Application created with required permissions. Client ID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx</code></pre>



<p>After this step we now can start the investigation. We need to connect to Exchange Online first:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; Connect-ExchangeOnline</code></pre>



<p>You might need to re-authenticate at this point to M365. (I did not need to log in again at this step)</p>



<p>And then we can start the Powershell script to search for malicious files (If you selected (M) when running the script for the first time, you must confirm execution again now):</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; Get-Mailbox -ResultSize Unlimited | .\CVE-2023-23397.ps1 -Environment "Online"</code></pre>



<p>At this point it is mandatory to authenticate again. Output should be similar to the following:</p>



<pre class="wp-block-code"><code>CVE-2023-23397 script version 23.03.15.2119
Trying to find Microsoft.Exchange.WebServices.dll in the script folder
Microsoft.Exchange.WebServices.dll wasn't found - attempting to download it from the internet

Prompting user for authentication, please minimize this window if you do not see an authorization prompt as it may be in the background

Waiting 60 seconds for app credentials to register..

Continuing...
Scanning 1 of 16 mailboxes (currently: mailbox1@yourtenant.com)
Scanning 2 of 16 mailboxes (currently: mailbox2@yourtenant.com)
Scanning 3 of 16 mailboxes (currently: mailbox3@yourtenant.com)
Scanning 4 of 16 mailboxes (currently: mailbox4@yourtenant.com)
Scanning 5 of 16 mailboxes (currently: mailbox5@yourtenant.com)
&#91;...]
Scanning 16 of 16 mailboxes (currently: mailbox16@yourtenant.com)
<strong>No vulnerable item found</strong>

Do you have feedback regarding the script? Please email ExToolsFeedback@microsoft.com.</code></pre>



<p>I hope you will see the same output as I do. The script also supports deleting affected files. For more information please look at <a href="https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/" target="_blank" rel="noreferrer noopener">Microsofts script documentation</a>.</p>



<p>After checking the mailboxes, we no longer need the AzureAD Helper Application. To delete the application just run the following command:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; .\CVE-2023-23397.ps1 -DeleteAzureApplication</code></pre>



<p>You have probably already guessed: First you have to allow the script again and thereafter you have to authenticate to Microsoft 365 a last time <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p></p>



<p></p>



<p>I hope the explanation helped you to check your tenants. Feel free to let me know if it worked or if you had any problems with it.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/">Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Howto disable Azure AD Sync after migration</title>
		<link>https://blog.meb-it.de/en/howto-disable-azure-ad-sync-after-migration/</link>
					<comments>https://blog.meb-it.de/en/howto-disable-azure-ad-sync-after-migration/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Wed, 04 Aug 2021 14:04:52 +0000</pubDate>
				<category><![CDATA[Office365]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft365]]></category>
		<category><![CDATA[O365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=64</guid>

					<description><![CDATA[<p>It comes the day when you finally migrated all your users and mailboxes from onprem to the cloud. This article show the steps needed to disable Azure AD sync from your local domain to Azure AD. The first step will be to uninstall the Azure AD Sync tool. Uninstall the tool from the server/machine its [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-disable-azure-ad-sync-after-migration/">Howto disable Azure AD Sync after migration</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>It comes the day when you finally migrated all your users and mailboxes from onprem to the cloud. This article show the steps needed to disable Azure AD sync from your local domain to Azure AD.</p>



<p></p>



<p>The first step will be to uninstall the Azure AD Sync tool. Uninstall the tool from the server/machine its running on.</p>



<p></p>



<p>In the next step we need to connect to Azure AD via Powershell. This does not work with Linux, that&#8217;s why we need a Windows machine. Open Powershell as admin and type the following to install the required cmdlets:</p>



<pre class="wp-block-code"><code>Install-Module -Name MSonline</code></pre>



<p>If you are prompted chose &#8220;Y&#8221; for yes to install the module.</p>



<p>In the next step we are connecting to Azure AD:</p>



<pre class="wp-block-code"><code>Connect-MsolService</code></pre>



<p>Type in your credentials when the prompt opens and hit Enter.</p>



<p>Now we are going to check whether Azure AD Sync is enabled:</p>



<pre class="wp-block-code"><code>(Get-MsolCompanyInformation).DirectorySynchronizationEnabled</code></pre>



<p>If you receive &#8220;True&#8221; as answer, Azure AD sync is enabled. If you receive &#8220;False&#8221; it&#8217;s disabled. In the case of &#8220;False&#8221; you don&#8217;t need to do anything further!</p>



<p>Now we are going to disable the synchronization:</p>



<pre class="wp-block-code"><code>Set-MsolDirSyncEnabled -EnableDirSync $false</code></pre>



<p>If we now check the Azure AD Sync status it should show &#8220;False&#8221;:</p>



<pre class="wp-block-code"><code>(Get-MsolCompanyInformation).DirectorySynchronizationEnabled</code></pre>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-disable-azure-ad-sync-after-migration/">Howto disable Azure AD Sync after migration</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-disable-azure-ad-sync-after-migration/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Howto enable DKIM in Microsoft 365</title>
		<link>https://blog.meb-it.de/en/howto-enable-dkim-in-microsoft-365/</link>
					<comments>https://blog.meb-it.de/en/howto-enable-dkim-in-microsoft-365/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Fri, 30 Jul 2021 14:50:24 +0000</pubDate>
				<category><![CDATA[Office365]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[DKIM]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft365]]></category>
		<category><![CDATA[O365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=43</guid>

					<description><![CDATA[<p>DKIM (Domain Keys Identified Mail) should always be enabled on all of your domains used for email. If you do not enable DKIM your mails may inadvertently get treated as spam. The following tutorial shows you how to enable DKIM for your sending domain(s) in Microsoft365 / Office365. As the first step we need to [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-enable-dkim-in-microsoft-365/">Howto enable DKIM in Microsoft 365</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>DKIM (Domain Keys Identified Mail) should always be enabled on all of your domains used for email. If you do not enable DKIM your mails may inadvertently get treated as spam. The following tutorial shows you how to enable DKIM for your sending domain(s) in Microsoft365 / Office365.</p>



<p>As the first step we need to connect to our M365 Powershell. The last paragraph in <a href="https://blog.meb-it.de/en/powershell-on-linux/" target="_blank" rel="noreferrer noopener">this article</a> describes how to do this.</p>



<p>The following command shows a comprehensive list of DKIM related information for domain &#8220;domain.com&#8221;:</p>



<pre class="wp-block-code"><code>Get-DkimSigningConfig -Identity domain.com | Format-List</code></pre>



<p>If we just want to check the DKIM status of our domains we can use the following command:</p>



<pre class="wp-block-code"><code>Get-DkimSigningConfig</code></pre>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="187" src="https://blog.meb-it.de/wp-content/uploads/2021/07/01-getdkimsigningconfig-1024x187.png" alt="" class="wp-image-49" srcset="https://blog.meb-it.de/wp-content/uploads/2021/07/01-getdkimsigningconfig-1024x187.png 1024w, https://blog.meb-it.de/wp-content/uploads/2021/07/01-getdkimsigningconfig-300x55.png 300w, https://blog.meb-it.de/wp-content/uploads/2021/07/01-getdkimsigningconfig-768x141.png 768w, https://blog.meb-it.de/wp-content/uploads/2021/07/01-getdkimsigningconfig.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>cmdlet Get-DkimSigningConfig</figcaption></figure>



<p>My example shows that DKIM is enabled for our Microsoft tenant domain but isn&#8217;t for our primary sending domain. Before we are able to enable DKIM for our sending domain we need to setup DNS records for verification:</p>



<pre class="wp-block-code"><code>Get-DkimSigningConfig -Identity domain.com | Format-List Selector1CNAME, Selector2CNAME</code></pre>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="152" src="https://blog.meb-it.de/wp-content/uploads/2021/07/02-getdkimsigningconfig-1024x152.png" alt="" class="wp-image-50" srcset="https://blog.meb-it.de/wp-content/uploads/2021/07/02-getdkimsigningconfig-1024x152.png 1024w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-getdkimsigningconfig-300x44.png 300w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-getdkimsigningconfig-768x114.png 768w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-getdkimsigningconfig-1536x227.png 1536w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-getdkimsigningconfig.png 1553w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>cmdlet Get-Dkim-SigningConfig</figcaption></figure>



<p>Now we need to set the CNAME records in our dns. Copy selector1 and create a new CNAME entry in your DNS settings. Repeat for selector2 (Destination is just an example, use the output generated in the previous step):</p>



<pre class="wp-block-code"><code>Host: selector1._domainkey
Destination: selector1-domain-com._domainkey.youronmicrosoftdomain.onmicrosoft.com

Host: selector2._domainkey
Destination: selector2-domain-com._domainkey.youronmicrosoftdomain.onmicrosoft.com</code></pre>



<p>At this point we need to wait until the dns records have been propagated. Wait at least 10 &#8211; 15 minutes until you proceed. Chose on of the options below:</p>



<p></p>



<h3 class="wp-block-heading">Option 1: Via Powershell</h3>



<p>Open a Powershell session to your M365 tenant and type the following command:</p>



<pre class="wp-block-code"><code>Set-DkimSigningConfig -Identity domain.com -Enabled $true</code></pre>



<hr class="wp-block-separator"/>



<h3 class="wp-block-heading">Option 2: Via Security Admin center</h3>



<ul class="wp-block-list"><li>Login to M365 Admin center (https://admin.microsoft.com)</li><li>Go to Security Admin center</li><li>Go to Threat management -&gt; Policy</li><li>Click on DKIM</li><li>Click on your domain</li><li>Turn the disabled slider to enabled and save</li></ul>



<hr class="wp-block-separator"/>



<h3 class="wp-block-heading">Option 3: Via old Exchange Admin center</h3>



<ul class="wp-block-list"><li>Login to M365 Admin center (https://admin.microsoft.com)</li><li>Go to Exchange Admin center</li><li>Go to Classic Exchange admin center</li><li>Go to Protection -> dkim</li><li>Double click your sending domain and click on Enable</li></ul>



<p></p>



<p>If you encounter an error in on of the above steps make sure that your DNS records are set properly. You can check the entries with the following command for Linux:</p>



<pre class="wp-block-code"><code>dig selector1._domainkey.domain.com
dig selector2._domainkey.domain.com</code></pre>



<p>The output should include the CNAME entry for selector1/selector2 you created in your domain name settings. If you are using Windows you can use the following cmd command:</p>



<pre class="wp-block-code"><code>nslookup -q=CNAME selector1._domainkey.domain.com
nslookup -q=CNAME selector2._domainkey.domain.com</code></pre>



<p>Both selectors must be correctly set before Microsoft allows you to enable DKIM for your domain. If both entries are correct wait another 15 -30 minutes and try to enable DKIM via one of the above options again.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-enable-dkim-in-microsoft-365/">Howto enable DKIM in Microsoft 365</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-enable-dkim-in-microsoft-365/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Move a M365 Mailbox to another database server</title>
		<link>https://blog.meb-it.de/en/move-a-m365-mailbox-to-another-database-server/</link>
					<comments>https://blog.meb-it.de/en/move-a-m365-mailbox-to-another-database-server/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Sat, 24 Jul 2021 11:38:58 +0000</pubDate>
				<category><![CDATA[Office365]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Exchange Online]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft365]]></category>
		<category><![CDATA[O365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=16</guid>

					<description><![CDATA[<p>If you need to move a specific mailbox in Microsoft 365 to a different database server, Powershell is your friend. Open a Powershell session and connect to your Microsoft 365 tenant. If you dont know how to connect to M365 via Powershell, check out the last paragraph in this article: Powershell on Linux First we [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/move-a-m365-mailbox-to-another-database-server/">Move a M365 Mailbox to another database server</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If you need to move a specific mailbox in Microsoft 365 to a different database server, Powershell is your friend. Open a Powershell session and connect to your Microsoft 365 tenant. If you dont know how to connect to M365 via Powershell, check out the last paragraph in this article: <a href="https://blog.meb-it.de/powershell-on-linux/">Powershell on Linux</a></p>



<p>First we should check the actual database server the mailbox is located on:</p>



<pre class="wp-block-code"><code>Get-MailboxLocation -Identity user@domain.com</code></pre>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="551" src="https://blog.meb-it.de/wp-content/uploads/2021/07/01-getmailboxlocation-1024x551.png" alt="" class="wp-image-17" srcset="https://blog.meb-it.de/wp-content/uploads/2021/07/01-getmailboxlocation-1024x551.png 1024w, https://blog.meb-it.de/wp-content/uploads/2021/07/01-getmailboxlocation-300x161.png 300w, https://blog.meb-it.de/wp-content/uploads/2021/07/01-getmailboxlocation-768x413.png 768w, https://blog.meb-it.de/wp-content/uploads/2021/07/01-getmailboxlocation.png 1140w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>cmdlet Get-MailboxLocation</figcaption></figure>



<p>As you can see in the above image, the field &#8220;DatabaseLocation&#8221; shows the hostname of our database server. We are now going to set up a move request for this mailbox. In Microsoft 365 / Exchange Online we are not able to chose the desired server we want to move our mailbox to. Microsoft will move the mailbox to a random, different server:</p>



<pre class="wp-block-code"><code>New-MoveRequest -Identity user@domain.com</code></pre>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="205" src="https://blog.meb-it.de/wp-content/uploads/2021/07/02-newmoverequest-1024x205.png" alt="" class="wp-image-18" srcset="https://blog.meb-it.de/wp-content/uploads/2021/07/02-newmoverequest-1024x205.png 1024w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-newmoverequest-300x60.png 300w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-newmoverequest-768x154.png 768w, https://blog.meb-it.de/wp-content/uploads/2021/07/02-newmoverequest.png 1129w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>cmdlet New-MoveRequest</figcaption></figure>



<p>Once we created the move request we need to wait for the moving provess to finish. We are able to check the status with the following command:</p>



<pre class="wp-block-code"><code>Get-MoveRequestStatistics -Identity user@domain.com</code></pre>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="191" src="https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-01-1-1024x191.png" alt="" class="wp-image-20" srcset="https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-01-1-1024x191.png 1024w, https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-01-1-300x56.png 300w, https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-01-1-768x143.png 768w, https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-01-1.png 1131w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>cmdlet Get-MoveRequestStatistics, status CreatingFolderHierarchy</figcaption></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="169" src="https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-02-1024x169.png" alt="" class="wp-image-21" srcset="https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-02-1024x169.png 1024w, https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-02-300x50.png 300w, https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-02-768x127.png 768w, https://blog.meb-it.de/wp-content/uploads/2021/07/03-getmoverequeststatistics-02.png 1127w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>cmdlet Get-MoveRequestStatistics, status CopyingMessages</figcaption></figure>
</div></div>



<p>It took this 18GB mailbox  about1.5 hours to finish. That depends most likely on the usage of source and destination server. After this operation has finished the user should restart their Outlook.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/move-a-m365-mailbox-to-another-database-server/">Move a M365 Mailbox to another database server</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/move-a-m365-mailbox-to-another-database-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Powershell on Linux</title>
		<link>https://blog.meb-it.de/en/powershell-on-linux/</link>
					<comments>https://blog.meb-it.de/en/powershell-on-linux/#comments</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 14:44:27 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Office365]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Exchange Online]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft365]]></category>
		<category><![CDATA[O365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=10</guid>

					<description><![CDATA[<p>Did you know Powershell is available for Linux too? Sometimes you need the Windows Powershell features available on your Linux machine, e.g. for M365, Exchange Online or Azure AD administration. Powershell can be easily installed but not all features are available. Linux derivates officially supported for Powershell 7.1: Ubuntu 16.04/18.04/20.04 Ubuntu 19.10 (via snap-packages) Debian [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/powershell-on-linux/">Powershell on Linux</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Did you know Powershell is available for Linux too? Sometimes you need the Windows Powershell features available on your Linux machine, e.g. for M365, Exchange Online or Azure AD administration. Powershell can be easily installed but not all features are available.</p>



<p>Linux derivates officially supported for Powershell 7.1:</p>



<ul class="wp-block-list"><li>Ubuntu 16.04/18.04/20.04 </li><li>Ubuntu 19.10 (via snap-packages)</li><li>Debian 9/10</li><li>CentOS/RHEL 7/8</li><li>Fedora 30</li><li>Alpine (from 3.11)</li></ul>



<h2 class="wp-block-heading">Installation example (Ubuntu 20.04)</h2>



<p>You can directly install Powershell via repository:</p>



<pre class="wp-block-code"><code># Update the list of packages
sudo apt-get update
# Install pre-requisite packages.
sudo apt-get install -y wget apt-transport-https software-properties-common
# Download the Microsoft repository GPG keys
wget -q https://packages.microsoft.com/config/ubuntu/20.04/packages-microsoft-prod.deb
# Register the Microsoft repository GPG keys
sudo dpkg -i packages-microsoft-prod.deb
# Update the list of products
sudo apt-get update
# Enable the "universe" repositories
sudo add-apt-repository universe
# Install PowerShell
sudo apt-get install -y powershell
# Start PowerShell
pwsh</code></pre>



<h2 class="wp-block-heading">Connect to Office 365 Powershell</h2>



<p>After Powershell has been installed, it&#8217;s very easy to connect to Office 365. Open the Powershell terminal and type the following (First step will ask for O365 admin credentials)</p>



<pre class="wp-block-code"><code>$O365Credential = Get-Credential

$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $O365Credential -Authentication Basic -AllowRedirection

Import-PSSession -Session $Session</code></pre>



<p>The last step takes a few seconds until the Office 365 session has been imported. Afterwards you can run the available Powershell cmdlets.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/powershell-on-linux/">Powershell on Linux</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/powershell-on-linux/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
