Feedback by UserVoice

Paul Garbett

My feedback

  1. 79 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Office 365 Admin » Exchange Admin  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Paul Garbett commented  · 

    This has recently presented us with a challenge as we sold part of our business and want to separate permissions between two countries but are unable to do so.
    Due to time zones and issues requiring resources on site, it would make sense for the Global admins to be able to delegation country specific administration rights to individuals that look after a certain country.

    Paul Garbett supported this idea  · 
  2. 3,632 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    199 comments  ·  Office 365 Security & Compliance  ·  Flag idea as inappropriate…  ·  Admin →

    Azure Active Directory Conditional Access has functionality for “Countries/Regions” – see https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

    That said, the most effective protection you can have against password spray attacks is to enable MFA and disable basic authentication. If you cannot do this for your entire organization, then blocking user access to legacy protocols like POP, EWS, IMAP and SMTP is another step you can take. Exchange Online Client Access Rules can help you to further customize (https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules). For additional recommendations, please see Office 365 Secure Score.

    That said, please know that we are listening to feedback and working on solutions to help make Office 365 users more secure. Thank you for the feedback.

    Paul Garbett supported this idea  · 
    An error occurred while saving the comment
    Paul Garbett commented  · 

    We are also seeing similar behaviour to below and would like to be able to control what countries can login to our tenant,

  3. 1,474 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    66 comments  ·  Office 365 Admin » Apps and App Launcher  ·  Flag idea as inappropriate…  ·  Admin →
    Paul Garbett supported this idea  · 
  4. 14 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Microsoft 365 Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Paul Garbett supported this idea  · 
    An error occurred while saving the comment
    Paul Garbett commented  · 

    Agree. This has caused us operational issues, it was raised with MS and we told this was design as Office 365 groups were the new strategy.
    However there will always be a place for DL's where people want the notification delivered to their own mailbox, take Infrastructure/system alerts that people see on their phones when not in office.
    Very disappointed in how this has been introduced, MS ideas are great but the implementations of these new features are very poor and not thought through.... How more people has this caused issues for.
    Imagine a user is a member of 4 DL's that means they would now have 5 mailboxes to view and check ... if they were office 365 groups.

  5. 137 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    10 comments  ·  Office 365 Admin  ·  Flag idea as inappropriate…  ·  Admin →

    We know that there is no good way of managing external users in the Admin Portal today and we are thinking about ways to solve this.

    An error occurred while saving the comment
    Paul Garbett commented  · 

    I this noticed these a while ago and wondered what they were #EXT#@domainame.onmicrosoft.com unlicensed.
    Please fix this issue, so there is a correct view for external users.

  6. 35 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  Office 365 Security & Compliance » Malware  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Paul Garbett commented  · 

    We have the same issue, raised with MS Premier support who advised currently this is working as designed. The NDR backscatter setting doesn't stop this as the emails are not classed as backscatter as they are notifications which are configurable.
    As we can't put our spoofing transport rule before malware in the order of scanning, the only other options MS advised were to implement DKIM and dmarc, but I've seen mixed results on forums from implementing this so am holding fire for the moment.

    Paul Garbett supported this idea  · 
  7. 36 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Office 365 Admin » Exchange Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Paul Garbett shared this idea  · 

Feedback and Knowledge Base