Feedback by UserVoice

Drew Lanclos

My feedback

  1. 7 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Office 365 Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos supported this idea  · 
  2. 7 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  General  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos supported this idea  · 
  3. 459 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Drew Lanclos commented  · 

    This is actually now available in the Security & Compliance Center, just not Exchange Admin Console. Unfortunately S&C doesn't readily show you where emails have been released to recipients, whereas EAC does, so it's not perfect, but it's better than it was.

    Drew Lanclos supported this idea  · 
  4. 159 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    9 comments  ·  Office 365 Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos supported this idea  · 
  5. 30 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  Office 365 Security & Compliance » Malware  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos commented  · 

    I worked around it sort-of by changing the notification alert from "delete all" to "delete attachment and replace with text file", with a custom string inserted. Then I set up mail flow rules looking for that attachment with that string, and based on whether or not an SPF-Pass was included, I'd either expunge the email entirely or I'd redirect it to the quarantine-handling group.

    Drew Lanclos shared this idea  · 
  6. 18 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Office 365 Admin » Exchange Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos commented  · 

    It'd cause a lot of user disruption if a password change immediately invalidated all their other tokens.

    The best procedure to do in the case of an offboarding is to disable ActiveSync entirely for that user. I usually block all individual devices and then block the service itself. This allows time for the token itself to expire but allows us to initiate a wipe without allowing a device to reconnect whenever we turn ActiveSync back on.

  7. 9 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Office 365 Admin » Exchange Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos commented  · 

    This can be done in PowerShell with Set-MailContact -HiddenFromAddressListsEnabled $true.

    If it's a dirsync'd contact, then it will also respect msExchHideFromAddressBook (or whatever the property is).

    It should be visible in the UI of course.

  8. 477 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    8 comments  ·  Office 365 Admin » Exchange Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos commented  · 

    This only applies to hybrid deployments. It works fine if you're not hybrid.

    The shared mailbox is still unfortunately tied to a dirsync'd user and so you can't disable dirsync for that user or the mailbox goes bye-bye...

  9. 129 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Office 365 Admin » Exchange Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos supported this idea  · 
  10. 6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Drew Lanclos shared this idea  · 
  11. 31 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Office 365 Security & Compliance  ·  Flag idea as inappropriate…  ·  Admin →
    Drew Lanclos supported this idea  · 

Feedback and Knowledge Base