List of new Office 365 features announced in SharePoint Conference 2018 at Las Vegas

Hi Folks ,

Please go through the images below to have a sneak peek of the new features in Office 365 that was announced inĀ  the SharePoint Conference at Las Vegas .Just in case you have missed to see the SharePoint Virtual Summit you can view the recording from this link .

Note : Most of these features that you see below are yet to be released and few of them are already avaiable for you to use in Office 365 .

32982060_238101906745399_2638378352435527680_n33021464_238102720078651_7887346275304079360_n33028598_238102353412021_4820371087701311488_n133036597_238102380078685_4720150121793191936_n33042186_238101876745402_6257477152216711168_n33042187_238102470078676_8589927647037882368_n33046853_238102493412007_1125072193630240768_n33058191_238102653411991_5322901481311961088_n33059904_238104216745168_4102799485535518720_n33060391_238103466745243_5363794934384033792_n33061411_238102626745327_1687673095059406848_n33067064_238103553411901_4401757281243365376_n33072861_238102566745333_6534047765901606912_n33073847_238103886745201_4540903235107422208_n33075265_238104066745183_8162170379192762368_n33076231_238102210078702_1363411336318418944_n33076241_238102146745375_6134237321970581504_n33077948_238103916745198_8247650042383433728_n33079122_238103953411861_8388707441377804288_n33085459_238102320078691_7032491188892467200_n33091384_238104116745178_1670325885359620096_n33094475_238103500078573_3337705302895099904_n33095515_238103366745253_7399257674866491392_n33096337_238102016745388_2377440406095790080_n33097341_238102053412051_3244264149022146560_n33097345_238103696745220_2467963211295490048_n33098180_238102746745315_7010045801472720896_n33099751_238104193411837_4482593951643074560_n33100554_238102180078705_7447327769182076928_n33101798_238104320078491_7997486773124988928_n33104597_238102296745360_5131069803577999360_n33104666_238103626745227_1995846924216827904_n33105770_238103600078563_6807240263254147072_n33115517_238101933412063_8697246085057347584_n33116247_238104293411827_6461747596405768192_n33118899_238102080078715_6779472908843483136_n33120788_238103430078580_4385431698234408960_n33132454_238102403412016_4503562948349788160_n33135320_238102240078699_7965607644658401280_n33136420_238104256745164_6350459414603890688_n33141840_238103663411890_6527062615774986240_n33145793_238101990078724_6201572633826295808_n33186060_238103530078570_3315422930959073280_n33193239_238102600078663_6804428468424540160_n33207295_238102270078696_7307572273559371776_n33358612_238102693411987_919501396552712192_n

Good luck in adopting these new features in Office 365 …..Happy SharePointing!!!

Part 1 -How Secure is your Office 365 Ecosystem?

 

1

Note : You can also view my webinar recording on this topic from the link below

So, todayā€™s blog post is going to be focused on the Security and Compliance features in Office 365 so that you folks can understand how secure your Office 365 ecosystem is. Itā€™s a known fact that organizations across the globe are embracing Digital transformation to meet the growing needs and deeds of todayā€™s Cloud first and Mobile first world and Office 365 is playing a vital role in this transformation. Now, if you think about this from a business standpoint, the reason to embrace digital transformation in an organization is wide because it just doesnā€™t help you to be meet the needs and deeds of your customer, but it also empowers your employees to be more creative and productive. Now, speaking about this I ā€˜d like to recall a quote from Jeff Bezos (CEO of Amazon) where he says, The biggest threat to successful companies is ā€œā€¦if you wonā€™t or canā€™t embrace powerful trends quickly. If you fight them, youā€™re probably fighting the future. Embrace them and you have a tailwind.ā€ Ā Iā€™m pretty sure this makes a lot of sense.

Alright, now speaking about the Security and Compliance features in Office 365, we all know that Office 365(formerly known as BPOS) was introduced on 2011 and it has come a long way since then. It has received many major updates as well as many new features and services alongside this journey and today it has turned out to become worldā€™s number 1 SaaS solution and Microsoft has worked hard to keep up this place. The below mentioned image should give you an overview of the current momentum of Office 365 in todayā€™s IT market.

2

3

Although, these numbers are great and undoubtfully Office 365 is really a great service. We as customers are always concerned about security because our data is not in our datacenters and instead itā€™s in Microsoftā€™s datacenter and there are many other parameters that concerns us. I often hear this from my friends who work as CISOā€™s in their respective organizations and of course many security folks whom I know in the industry have shared the same vision. So, the burning question in all our minds is ā€¦. What about security? How do I ensure that I have not been compromised? How do I make sure that my data is in my control even though Microsoft is the custodian for it? Also in addition to that, todayā€™s security landscape is really scary .

4

5

Moreover, itā€™s just not that ā€¦Earlier when we all had our applications such as Exchange Server, SharePoint Server, Skype for Business server & LOB apps running in on-premises servers in our datacenters we had the concept of firewall which was acting as the security perimeter as shown in the image below.

6

Now, with Cloud we have fewer boundaries but more data and more apps which bring in more complexity as shown in the image below.

7

This of course raises a question in all our minds as decision makers about how can I enable productivity without compromising security? Because all these services which Office 365 offers are really great, but how do I trust the service? How do I ensure that my data is on safe hands?

8

Well, there are a lot of tools out there that can be purchased for this purpose but then all these tools are meant to solve a specific purpose and they canā€™t solve all the problems related to security in Office 365. So, itā€™s quite confusing for the Security folks to decide which tool to buy to ensure that their data is secure. We have a wide variety tools but then they donā€™t solve all the problems and in addition to that you would also end up in managing all these tools individually which requires a lot of manpower and would often lead to management overhead as well. On top of this the license for all these products could cost you a fortune.

9

So, now that I have lined up all the issues that we face in securing data on a Cloud first mobile first world in front of you folks, Iā€™m going to explain about how to get rid of this and ensure that your data is secure by using all the Security and Compliance features in Office 365.

10.png

So, this post is mainly meant to showcase the security and compliance features in Office 365 that organizations can count on to ensure that Office 365 is really a trustworthy service and to also make them understand about how they can benefit from these features without purchasing multiple tools. These features that Iā€™m referring to can be a life saver as you can get everything you want as depicted in the image below.

11

Note: This is going to a series of articles where Iā€™ll be explaining each feature in detail. So initially Iā€™ll begin with giving an overview of all the features and in a later blog post Iā€™ll be getting into the nitty gritty of all the features. Alright, I guess Iā€™ve set the mood now so letā€™s get started ā€¦

Listed below are the areas of focus for Security and Compliance in Office 365 and we have couple of offerings from Microsoft for each of these areas. These services might not really add more value if you use them individually but when it is put together and given to as a service names as EMS (i.e. Enterprise Mobility and Security) it can make wonders.

Note:Ā  All the features that Iā€™ll be mentioning below can either be purchased separately or can be purchased together as package called as Enterprise Mobility and Security. EMS is available to us in two flavors as mentioned below

  1. Enterprise Mobility and Security E3 (aka: EMS E3)
  2. Enterprise Mobility and Security E3 (aka: EMS E5)

Please go through the link below to understand the licensing details for EMS E3 & E5

https://www.microsoft.com/en-in/cloud-platform/enterprise-mobility-security-pricing

12

The image below should give you an overview of all the offering we have under each area.

13

Now, letā€™s jump in and look into these offering individually.

1.Threat Protection:

Listed below are the offerings we have under Threat Protection category

  1. Exchange Online Protection (aka: EOP)
  2. Office 365 Advanced Threat Protection (aka: ATP)
  3. Office 365 Threat Intelligence

 

  1. Exchange Online Protection (aka: EOP):

14

Microsoft Exchange Online Protection (EOP) is an email filtering solution thatā€™s hosted on the cloud and it takes care of protection against spam and malicious malware attacks in your organization. Ā In addition to that it also protects your organization from messaging-policy violations. It sits in front all outlook.com and Office 365 mailboxes and scans all the emails. It can be used for both on-premises and cloud mailboxes.

Listed below are the primary ways of using EOP for message protection:

Standalone scenario: In this method Exchange Online Protection is used to provide cloud -based email filtering service for your on-premises Microsoft Exchange Server environment as well as legacy Exchange Server versions such as Exchange server 2007 or for any other on-premises SMTP email service providers.

With Microsoft Exchange Online (Office 365): By default, EOP protects Microsoft Exchange Online cloud-hosted mailboxes.

Hybrid deployment:Ā  EOP can be configured to protect your messaging environment if you have a Hybrid environment configured where you have a mix of mailboxes in on-premises as well as online.

The below mentioned image should give you an overview of how Exchange Online Protection Mail Flow works.

15.png

The below image should give you a high-level overview about how EOP processes incoming email.

16

Explanation:

  1. An incoming email from the internet initially goes through the connection filtering, where it checks the senderā€™s reputation and scans the message for malware. Most of the spam is stopped at this point and deleted by EOP.
  2. Once done the message continues through policy filtering, where messages are evaluated against custom transport rules that you create or enforce from a template. For instance, you can have a rule configured in such a manner that an email gets triggered to the managerā€™s mailbox when a mail arrives from a specific sender. (Data loss prevention checks also occurs at this point if you have that feature enabled)
  3. After that, messages pass through content filtering, where content is checked for terminology or properties common to spam. A message determined to be spam by the content filter can be sent to a userā€™s Junk Email folder or to the quarantine, among other options, based on your settings.
  4. Finally, after an email is scanned thoroughly by all these protection layers, it gets delivered to the recipient.

Now, letā€™s look into how the mail flow works on an inbound scenario, outbound scenario and on Hybrid mode (i.e. online and on-premises together).

a) How the inbound mail flow works?

  1. EOP routes email to your on-premises environment via outbound connectors
  2. Your on-premises email system receives via one or more anonymous receive connectors
  3. You do not need to configure both inbound and outbound mail flow at the same time

b) How the outbound mail flow works?

  1. On-premises servers route email to EOP for delivery to the internet by utilizing a smart host. In Exchange, that is a send connector for the * address space. Use the same address as the MX record is for the internet as smart host value
  2. Configure an inbound connector in Exchange Online Protection to receive emails from on-premises. Configure connector to accept only from your on-premises TLS certificate or configure to receive from your IP range.
  3. EOP will scan for outbound spam and route to internet via EOP published IP ranges for email or the unpublished ā€œhigh risk poolā€ of IP addresses for identified spam.

c) How the mail flow works in Hybrid mode?

  1. Hybrid is a likelihood when you have Exchange Online mailboxes and Exchange Server on-premises
  2. All email to an Exchange Online mailbox goes through EOP ā€“ no direct delivery even with hybrid

Therefore, configure hybrid properly to ensure internal email is treated as internal

EOP Licensing:

  1. EOP standalone ā€“ This service is designed for on-premises Exchange mailboxes.
  2. EOP in Office 365 ā€“ This service is designed for Exchange Online mailboxes in the cloud.
  3. Exchange Enterprise CAL ā€“ This service is similar to EOP standalone plan, but it also includes data loss prevention and in addition to that it also includes PowerShell remoting administration capabilities.

Also, please go through this link below to know in detail about EOP licensing.

https://products.office.com/en-us/exchange/exchange-email-security-spam-protection

2.Office 365 Advanced Threat Protection (aka: ATP):

Office 365 Advanced Threat protection protects your email, SharePoint & OneDrive for Business files and Office Online files against unknown and highly sophisticated attacks. Initially when ATP was launched it was available only for emails. But today, ATP can take care of SharePoint Online, OneDrive for Business, Microsoft Teams and also Office Online.

17.png

Listed below are the four pillars of Office 365 Advanced Threat Protection:

  1. Secure your mailboxes against advanced threats
  2. Protect against unsafe attachments
  3. Protect your environment when users click malicious links
  4. Get rich reporting and track links in messages.

 

  1. Secure your mailboxes against advanced threats:

18.png

New malware campaigns are being launched every day by attackers, and Office 365 has a solution to help protect your email, files, and online storage against them. Office 365 Advanced Threat Protection can help to protect userā€™s mailboxes, SharePoint and OneDrive files, online storage, and applications against new, sophisticated attacks in real time. It offers holistic protection in Microsoft Teams, Word, Excel, PowerPoint, Visio, SharePoint Online, and OneDrive for Business. By providing protection against unsafe attachments and expanding the protection capabilities against malicious links, it leverages the security features of Exchange Online Protection to provide better zero-day protection.

2. Protect against unsafe attachments:

19

With Safe Attachments, you can prevent malicious attachments from impacting your messaging environment, even if their signatures are not known. Any content that looks suspicious goes through a real-time behavioral malware analysis that uses machine learning techniques to validate the content for suspicious activities. Unsafe attachments gets thoroughly scanned in a sandboxed environment before being sent to recipients. The advantage is a malware free and cleaner inbox with better zero-day attack protection. So what basically happens behind the scenes here is , every email gets scanned in the Safe attachment sandboxed environment which is built by Microsoft and the recipient would initially just receive the email body without the attachment stating that his attachment is being scanned and would be delivered in a minute .If the Safe attachment sandboxed environment doesnā€™t find any malicious content the recipient will receive the attachment in next few minutes , if not the attachment would be quarantined and the Office 365 admin as well as the user would be notified . Also, for any given reason if the attachment which has malicious content in it gets delivered and later MS figures out that it has malicious files in it, even at that point of time ATP can pull back that email despite of it reaching the userā€™s mailbox.

3.Protect your environment when users click malicious links:

20.png

Exchange Online Protection which we discussed above provides protection against harmful links by scanning the content in the link. Safe Links expands on this by protecting your environment when an end user clicks on link which is shared to him via an email. While the content is being scanned, the URLs are rewritten to go through Office 365. The URLs are examined in real time, at the time a user clicks them. If a link is unsafe, the user is warned not to visit the site or informed that the site has been blocked as shown in the screenshot above. Reporting is available, so administrators can track which users clicked a link and when they clicked it. In this case, the URLā€™s gets scanned in the Safe Link virtual environment by Microsoft which is similar to the Safe attachment sandboxed environment that I explained above.

4. Get rich reporting and track links in messages:

21

Gain critical insights into who is being targeted in your organization and the category of attacks you are facing. Reporting and message trace allows us to check the messages that have been blocked due to unknown viruses or harmful malwares. In addition to that URL trace allows us to track individual malicious links in the messages that have been clicked.

The below mentioned image should give you a complete overview about the architecture of Advanced Threat Protection in Office 365.

22.png

 

Purchasing Office 365 Advanced Threat Protection:

You can add Advanced Threat Protection to the following Exchange and Office 365 subscription plans:

  1. Exchange Online Plan 1 & Exchange Online Plan 2
  2. Office 365 F1
  3. Exchange Online Protection
  4. Office 365 Business Essentials
  5. Office 365 Business Premium
  6. Office 365 Enterprise E1
  7. Office 365 Enterprise E2
  8. Office 365 Enterprise E3
  9. Office 365 Enterprise E4
  10. Office 365 Enterprise E5
  11. Office 365 Enterprise K1
  12. Office 365 Enterprise K2
  13. Office 365 Education

5.Office 365 Threat Intelligence:

23

Threat Intelligence makes use of the Microsoft Intelligent Security Graph, which analyzes billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals and much more from the Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem.

So, in a nutshell whatā€™s Office 365 Threat Intelligence? Well, Office 365 Threat Intelligence helps Office 365 administrators andĀ  Security folks protect their organization’s Office 365 users by doing the below mentioned three things ā€¦.

  1. Making it easy to identify, monitor and understand attacks
  2. Helping to quickly address threats in Exchange Online and SharePoint Online
  3. Providing insights and knowledge to help prevent attacks against their organization

Now, if youā€™re wondering about whatā€™s a Microsoft Intelligent Security Graph which Iā€™ve explained above, let me try to explain that below.

The Microsoft Intelligent Security graph is a service built by Microsoft to collect telemetry data generated by all users using Office 365, devices that are connected to Office 365, IP addresses from which you login to Office 365 etc. and they have built an intelligent security graph. Now this basically has Machine Learning and Artificial intelligence built into it so that it studies every userā€™s behavior in Office 365 (meaning, from where a user logs in often, from which IP address does he/she login, from which country does he login, from which mobile device does he often connects to Office 365 etc.) and for any given reason if it finds an abnormal or anomaly activity from the normal behavior it marks that activity as malicious and takes appropriate security measures. The best part is, all this is done on its own without any human intervention. The below image should help you understand the amount of telemetry data Microsoft collects every month.

24

25.png

Although, this is jaw dropping and sounds bit crazy, thereā€™s a method to this madness. Now, let me try to explain that, the attacks that you see today in a cloud first mobile first world are very sophisticated and you need to respond to that in minutes and not in hours or days and if your failing to do so the amount damage caused could be really unbearable as attackers out there are getting smarter day by day. So, Iā€™m glad that Microsoft has built the Microsoft Intelligent Security graph for their Cloud services which helps us to be protected. Now based on the signal it gets from a userā€™s activity the below mentioned actions would be prompted for the user as shown in the image below. Microsoft says that they analyze 10 TB of data every day and this is expected to increase eventually.

26So, based on the conditions given to it such as (privileged user, unmanaged device etc.) it will grant access to the user. This is called as Conditional Access in Office 365 and Iā€™ll discuss about this in later blog post.

If youā€™re interested in knowing more about Microsoft Intelligent Security graph, Iā€™d urge you all to go through the below mentioned two links.

https://blogs.technet.microsoft.com/iftekhar/2018/02/25/artificial-intelligence-and-machine-learning-for-nextgen-threat-protection/

http://cloud-platform-assets.azurewebsites.net/intelligent-security-graph/

https://www.youtube.com/watch?v=-Q_G3yF9ZL4

So, what else do we have under Threat Intelligence? Well, we have three important components as a part of Threat intelligence which I want you folks to pay attention to.

  1. Threat dashboard:

You can use the Threat dashboard (this is also referred to as the Security dashboard) to quickly see what threats have been addressed, and this can also be used as a visual way to report to business decision makers how Office 365 services are securing your business.

27

To access this dashboard, navigate to Security & Compliance Center in the Office 365 admin center –>go to Threat management –>Dashboard.

Threat Explorer:

Threat explorer helps you to analyze threats, see the volume of attacks periodically, and analyze data by threat families, attacker infrastructure, and much more. The Threat explorer is the starting place for any security analyst’s investigation workflow.

28

To access this report, navigate to Security & Compliance Center in the Office 365 admin center –>Ā  go to Threat management–> Explorer.

Incidents:

You can use the Incidents list section to see a list of current security incidents. These Incidents can be used to track threats such as suspicious email messages and to conduct detailed investigation on those emails and drive them to remediation.

29.png

To access the list of current incidents for your organization, navigate to Security & Compliance Center in the Office 365 admin center –> go to Threat management –>Review –> Incidents.

Purchasing Office 365 Threat Intelligence:

Office 365 Threat Intelligence is available by default in Office 365 E5 and if youā€™re using a different plan such as Office 365 Enterprise E3 or Office 365 Enterprise E1, then you can add Office 365 Threat Intelligence as an addon to your existing plan

Alright folks, thatā€™s all I have for Part 1 and Iā€™ll see you folks on Part 2 ā€¦. Good luck in keeping your Office 365 ecosystem secure by utilizing all the features that Iā€™ve described above!!!

 

Recording of SharePoint Virtual Summit 2018 :

For all those folks who missed the live streaming of the SharePoint Virtual Summit yesterday , here’s the link to view the recording . #SPC2018

https://mediastream.microsoft.com/events/2018/1805/SharepointSummit/index-od.html

 

Good luck with all the new features in SharePoint Online & OneDrive for Business ….Happy SharePointing!!!!

Recording of our webinar on ā€œDeep Dive into the new Features of SharePoint Online and OneDrive for Business -Part 2ā€

Part 2

 

Webinar Recording :_Ā Ā https://youtu.be/UjJuoZ_7gvQ

Link to the PPT Slides :_Ā https://www.slideshare.net/VigneshGanesanMCPMCI/part-2-deep-dive-into-the-new-features-of-sharepoint-online-and-onedrive-for-business

Please keep checking my blog site for more webinars and useful articles .

Good luck with the new features in SharePoint Online and OneDrive for Business !!!

Useful PowerShell cmdlets to administer Office 365 Groups:

11

Howdy Folks! As promised in previous blog Ā post related to Office groups , Iā€™m back now with some cool PowerShell cmdlets which should ease your work in managing Office 365 groups in your organization . If youā€™re new to Office 365 groups, I humbly request you to read in detail about Office 365 groups by accessing this link. Iā€™ve tried my best to explain Office 365 groups there. You can read this post on HubFly blog site as well. Alright, letā€™s get started ā€¦.

Note : Before you can run all these PowerShell cmdlets below , you need to load the Exchange Online management shell by following this link .Iā€™ve given a screenshot below for your reference .

1

Listed below are the operations that you can perform by following the PowerShell commands mentioned below

  • Get the list of all the Office 365 groups in your tenant
  • Remove an existing Office 365 group from the tenant
  • To make changes to an existing Office 365 group
  • Get the membership and ownership information of an Office 365 group /all the Office 365 groups in your tenant
  • Get the list of all the Office 365 groups in descending order
  • Get the list of all Private Office 365 groups in your tenant
  • Get the list of deleted Office 365 groups in descending order
  • Get the list of orphaned Office 365 groups in your tenant
  • Retrieve the list of recently created Office 365 groups
  • Update the quota of a new group if a team site exists
  • Create new Directory Settings for Groups template
  • Update the classifications for all the Office 365 groups
  • Update the privacy of an Office 365 group based on its classification
  • Determine where a group was provisioned (Planner, Yammer, Teams etc.)
  • Get the list of Obsolete Office 365 groups in your tenant

So, letā€™s look into all these operations in detail belowā€¦.

  1. To get the list of all the Office 365 groups in your tenant:

Get-UnifiedGroup

2

  1. To remove an existing Office 365 group:

This will remove a specific Office 365 group from your tenant.

Remove-UnifiedGroup -Identity “Test Group”

  1. To make changes to an existing Office 365 group in your tenant:

Set-UnifiedGroup

Ex 1: Set-UnifiedGroup -Identity “HR Team” -AccessType Private

This example changes the Office 365 Group named HR Team from a public group to a private group.

Ex 2: Set-UnifiedGroup -Identity “HR Team” -PrimarySmtpAddress hrteam@o365techy.onmicrosoft.com -RequireSenderAuthenticationEnabled $false

This example makes the following changes to the Office 365 Group named HR Team:

i)The primary email address is changed to hrteam@o365techy.onmicrosoft.com.

ii)The Office 365 Group is allowed to receive mail from unauthenticated (external) senders.

  1. To get the membership and ownership information of an Office 365 group/all the Office 365 groups in your tenant:

Get-UnifiedGroupLinks

Ex: Get-UnifiedGroupLinks -Identity “Transport Department” -LinkType Members

This example shows the members of the Office 365 Group named Transport Department

Similarly, you can use the script below to get the list of all the members from all the Office 365 groups in you tenant.

Get Office 365 group members

This will run and display the results as shown in the screenshot below.

3

  1. To get the list of all the Office 365 groups in descending order:

Get-UnifiedGroup | Select Id, DisplayName, ManagedBy, Alias, AccessType, WhenCreated, @{Expression={([array](Get-UnifiedGroupLinks -Identity $_.Id -LinkType Members)).Count }; Label=’Members’} | Sort-Object whencreated | Format-Table displayname, alias, managedby, Members, accesstype, whencreated

4.png

  1. To get the list of all private Office 365 groups in your tenant:

Get-UnifiedGroup | Where-Object {$_.AccessType -eq ‘Private’} | Sort-Object whencreated | Format-Table displayname, alias, managedby, accesstype, whencreated

5.png

  1. To get list of deleted Office 365 groups in descending order:

Get-AzureADMSDeletedGroup | Sort-Object DeletedDateTime -Descending | Format-Table Id, DisplayName, Description, Visibility, DeletedDateTime

Note: To run this command, you need to do the below mentioned steps, else you would end up getting an error as shown in the image below. If you pay close attention to the cmdlet you would notice that this is related to Azure AD and hence you need to load the Azure AD PowerShell module for this.

Iā€™d suggest performing these tasks in a different PowerShell window for ease of use.

  1. Uninstall the production module of Azure AD by running, (Uninstall-Module AzureAD) as this cmdlet works with the preview module of Azure AD.
  2. You cannot have the production module and the preview module running on the same machine as per Microsoftā€™s documentation mentioned in this link https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2?view=azureadps-2.0
  3. Once done, please go ahead and install the Preview module by running (Install-module AzureADPreview)
  4. After that, please connect to Azure AD by running Connect-AzureAD as shown in the image below

12

5. Once youā€™re done connecting to Azure AD, please go ahead and run the above-mentioned cmdlet to get the list of deleted Office 365 groups in descending order and you will get the results as shown in the image below. In my case I donā€™t have any deleted Office 365 group and hence it didnā€™t return anything.

13

8.To get the list of orphaned Office 365 groups in your tenant:

$Groups = Get-UnifiedGroup | Where-Object {([array](Get-UnifiedGroupLinks -Identity $_.Id -LinkType Owners)).Count -eq 0} `

| Select Id, DisplayName, ManagedBy, WhenCreated

ForEach ($G in $Groups) {

Write-Host “Warning! The following group has no owner:” $G.DisplayName

}

14

9.To retrieve the list of recently created Office 365 groups:

# Variables:

#Ā Ā  Cutoff date in days

#Ā Ā  Storage quota in MB

#Ā Ā  Storage quota warning level in MB

#………………………………………………………………………………………………………………………………………

$cutoffdate = ((Get-Date).AddDays(-20))

$quota = 500

$warning = 400

$Groups = Get-UnifiedGroup | Where-Object {$_.WhenCreated -ge $cutoffdate} | Sort-Object whencreated | Select DisplayName, WhenCreated, SharePointSiteUrl

15.png

  1. To update the quota of a new group accordingly if a team site exists:

ForEach ($G in $Groups) {

try

{

Set-SPOSite ā€“Identity ($G.SharePointSiteUrl) -StorageQuota $quota -StorageQuotaWarningLevel $warning

Write-Host “The following site quota was updated:” $G.SharePointSiteUrl

}

catch

{

Write-Host “The following Groups does have a site:” $G.DisplayName

}

}

 

This will run and update the quota of the site as shown in the screenshot below.

16

11.To create new Directory Settings for Groups template:

There are multiple templates that are part of your Azure AD tenant.Ā  This template can contain a settings object which has a collection of values.Ā  By using these values, we can set the parameters below.Ā  This needs to be done before you can set any values

Setting Description
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  EnableGroupCreation

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: Boolean

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: True

The flag indicating whether Office 365 group creation is allowed in the directory by non-admin users. This setting does not require an Azure Active Directory Premium P1 license.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  GroupCreationAllowedGroupId

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

GUID of the security group for which the members are allowed to create Office 365 groups even when EnableGroupCreation == false.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  UsageGuidelinesUrl

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

A link to the Group Usage Guidelines.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  ClassificationDescriptions

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

A comma-delimited list of classification descriptions.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  DefaultClassification

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

The classification that is to be used as the default classification for a group if none was specified.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  PrefixSuffixNamingRequirement

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

String of a maximum length of 64 characters that defines the naming convention configured for Office 365 groups. For more information, seeĀ Enforce a naming policy for Office 365 groups (preview).
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  CustomBlockedWordsList

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

Comma-separated string of phrases that users will not be permitted to use in group names or aliases. For more information, seeĀ Enforce a naming policy for Office 365 groups (preview).
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  EnableMSStandardBlockedWords

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: Boolean

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œFalseā€

Do not use
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  AllowGuestsToBeGroupOwner

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: Boolean

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: False

Boolean indicating whether or not a guest user can be an owner of groups.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  AllowGuestsToAccessGroups

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: Boolean

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: True

Boolean indicating whether or not a guest user can have access to Office 365 groups content. This setting does not require an Azure Active Directory Premium P1 license.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  GuestUsageGuidelinesUrl

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

The URL of a link to the guest usage guidelines.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  AllowToAddGuests

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: Boolean

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: True

A Boolean indicating whether or not is allowed to add guests to this directory.
Ā·Ā Ā Ā Ā Ā Ā Ā Ā  ClassificationList

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Type: String

Ā·Ā Ā Ā Ā Ā Ā Ā Ā  Default: ā€œā€

A comma-delimited list of valid classification values that can be applied

Let me walk you through the complete process of creating directory settings here.

  1. Install the Azure AD PowerShell Module V2 from this link
  2. Run ā€œInstall-Module -Name AzureADPreviewā€ in the PowerShell window
  3. Once done Connect to Azure AD via PowerShell by running ā€œConnect-AzureADā€
  4. Once done to review if you have any settings already configured in your tenant, please run the below cmdlet.

Ā Get-AzureADDirectorySetting | ForEach Values

17

Note: If you check the screenshot above you will notice that I have configured few directory settings such as ā€œUsage Guidelines URL ā€œand ā€œClassification List ā€œand Iā€™ll be showing you how to configure that using PowerShell in the examples below.

5. If you do not have any settings configured the value returned will be blank as show in the screenshot below.

18

6. Alright, now letā€™s see some examples to set group settings.

7. All examples below will use the Get-AzureADDirectorySetting cmdlet and store that in a variable and then use the Set-AzureADDirectorySetting cmdlet with the updated settings. The full command to run a setting update is as follows. Also, Iā€™d suggest to use PowerShell ISE for running these cmdlets for ease of usage.

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

$settings[“SETTING NAME”] = “”

Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings

19.pngOk, now letā€™s look into some scenarios here …

Scenario 1: Ā Restricting Office 365 groups creation for all the users in your organization except for few users who belong to a specific Security group

$group = Get-AzureADGroup -All $True | Where-Object {$_.DisplayName -eq ā€œOffice 365 groups creation allowedā€}

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

$settings[“EnableGroupCreation”] = “false”

$settings[“GroupCreationAllowedGroupId”] = $group.ObjectId

Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings

20In this scenario here, I created a security group named ā€œOffice 365 groups creation allowedā€ and Iā€™ve added few members to it. So, by doing this I can grant access only to those members to create Office 365 groups and not to all the users in my organization. Also, an important point to bear in mind here is, if Iā€™m restricting the creation of Office 365 groups then these users wonā€™t be able to create a Team, a Planner, a Yammer group etc. So, the users will be restricted by creating anything which creates an Office 365 group in the backend. So, from an end user perspective, the ā€œcreateā€ button which you see in the screenshot below for creating Office 365 groups wonā€™t be visible to them. The same applies for other services also, users wonā€™t get the ā€œCreate Planner ā€œor ā€œCreate Teamā€ button once this option is enabled. This is one way to have control on Office 365 groups creation in your organization

6.png

In Teams, the ā€œCreate a Team ā€œbutton wonā€™t be visible for the users who are not part of that Security group which allows the creation of Office 365 groups.

7.png

In Planner, the ā€œCreate a Plan ā€œbutton wonā€™t be visible for the users who are not part of that Security group which allows the creation of Office 365 groups.

8

Similarly , as already explained above other services which creates an Office 365 group on the backend wonā€™t be available for end users . By doing this you can have control over who gets to create an Office 365 groups and other services such as Teams and Planner in your organization .

Scenario 2: Setting Office 365 groups classification

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

$settings[“ClassificationList”] = “Internal,External,Confidential”

Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings

In this scenario, weā€™re enabling the classification option so that you can classify your groups accordingly. Once this is done whenever you try to create an Office 365 group from the outlook webmail (provided that you have access to create Office 365 groups) you will get an option to choose the classification for that group also as shown in the image below. This could be useful from a compliance and governance perspective.

9.png

Once thatā€™s done you can set the classification for an existing Office 365 by running the below PowerShell command.

Set-UnifiedGroup <TestGroup@o365techy.onmicrosoft.com> -Classification <Internal>

Also, if you want to create a new group with a classification then run the below PowerShell command for that.

New-UnifiedGroup <TestGroup@o365techy.onmicrosoft.com> -Classification <External> -AccessType <Public>

Scenario 3: Ā Setting Usage Guidelines URL

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

$setting[“UsageGuidelinesUrl”] = “<https://o365techy.sharepoint.com/sites/office365groupsgovernance/usageguidelines/SitePages/Home.aspx>&#8221;

Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings

21

In this scenario, Iā€™ve created a SharePoint subsite named ā€œUsage Guidelinesā€ which speaks about all the guidelines a user must follow while using Office 365 groups in my organization and the user can refer that while creating / using Office 365 groups. Once this has been enabled this what the end user view would be like. Please check the screenshot below.

10

Scenario 4: Restrict all access for guest users to Groups including the ones that were already granted access

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

$settings[“AllowGuestsToAccessGroups”] = “False”

Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings

22Scenario 5: Restrict the ability to add any new guest users but do not restrict existing guest users

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

$settings[“AllowToAddGuests”] = “False”

$settings[“AllowGuestsToAccessGroups”] = “True”

Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings

23Finally, if you want to review all the updated settings then please run the below mentioned PowerShell cmdlet as already described above and it will return the updated settings.

Get-AzureADDirectorySetting | ForEach Values

24

Ā If you want to remove the group settings that we configured in all the scenarios above then please run the below PowerShell command.

$settings = Get-AzureADDirectorySetting | where-object {$_.displayname -eq ā€œGroup.Unifiedā€}

Remove-AzureADDirectorySetting -Id$settings.Id

25.png12.To update the classifications for all the Office 365 groups:

## Set classifications for all groups

$Groups = Get-UnifiedGroup | Where-Object {$_.Classification -Eq $Null}Ā  | Select DisplayName, Classification

ForEach ($G in $Groups) {

If ($G.Classification -Eq $Null)

{

Write-Host $G.DisplayName

Set-UnifiedGroup -Identity $G.DisplayName -Classification “Internal”

}

}

 

#……………………………..

# Variables:

#Ā Ā  Cut off date in days

#Ā Ā  Classification

#……………………………..

$cutoffdate = ((Get-Date).AddDays(-10))

$classification = “High”

# Retrieve recently created groups with accesstype set to PUBLIC

$Groups = Get-UnifiedGroup | Where-Object {

$_.WhenCreated -ge $cutoffdate -and $_.AccessType -eq ‘Public’ -and $_.Classification -eq $classification } `

| Sort-Object whencreated | Select DisplayName, WhenCreated, AccessType, Classification, ManagedBy

# For each new group update set accesstype to PRIVATE

ForEach ($G in $Groups) {

Set-UnifiedGroup -Identity $G.DisplayName -AccessType ‘Private’

Write-Host “The following Group privacy setting was updated:” $G.DisplayName

}

26This will run and update the classification for all the Office 365 groups as shown in the image below

27

  1. To update the privacy of an Office 365 group based on its classification:

#……………………………..

# Variables:

#Ā Ā  Cutoff date in days

#Ā Ā  Classification

#……………………………..

$cutoffdate = ((Get-Date).AddDays(-10))

$classification = “High”

# Retrieve recently created groups with accesstype set to PUBLIC

$Groups = Get-UnifiedGroup | Where-Object {

$_.WhenCreated -ge $cutoffdate -and $_.AccessType -eq ‘Public’ -and $_.Classification -eq $classification } `

| Sort-Object whencreated | Select DisplayName, WhenCreated, AccessType, Classification, ManagedBy

# For each new group update set accesstype to PRIVATE

ForEach ($G in $Groups) {

Set-UnifiedGroup -Identity $G.DisplayName -AccessType ‘Private’

Write-Host “The following Group privacy setting was updated:” $G.DisplayName

}

30.png

31.png

14.To determine where a group was provisioned (Planner, Yammer, Teams etc.)

To get the list of Yammer integrated Office 365 group list:

Get-UnifiedGroup |Where-Object {$_.ProvisioningOption -eq ‘YammerProvisioning’} |select DisplayName,Alias,ProvisioningOption,GroupSKU,SharePointSiteUrl,SharePointDocumentsUrl,AccessType

To get the list of Teams integrated Office 365 group list:

Get-UnifiedGroup |Where-Object {$_.ProvisioningOption -eq ‘ExchangeProvisioningFlags:481’}|select DisplayName,Alias,ProvisioningOption,GroupSKU,SharePointSiteUrl,SharePointDocumentsUrl,AccessType

Similarly, we expect MSFT to work on for Planner and other services which create an Office 365 on the backend.

15.To get the list of Obsolete Office 365 groups in your tenant:

This is a PowerShell script from Office 365 fame Tony Redmond and the explanation for the script can be found below.

Note : You need to be connected to Exchange Online PowerShell module as well as the SharePoint Online PowerShell module to run this script

Like any object, an Office 365 Group might become unused over time. No current method exists to detect what groups are underused, so here’s a script that does the job for you by checking audit records to establish whether any SharePoint file activity has occurred in the group document library in the last 90 days and whether any conversations have happened in the group mailbox in the last year. Seeing that it’s all done in simple PowerShell, you can tailor the code to your heart’s content. A HTML report file is generated at the end, which contains some statistics like:

32.jpg

Number of groups scanned: 155

Number of potentially obsolete groups (based on document library activity): 132

Number of potentially obsolete groups (based on conversation activity): 60

Number of Teams-enabled groups: 41

Percentage of Teams-enabled groups: 26.45%

Script:

Check for obsolete Office 365 groups

Thanks for reading this post ā€¦. Good luck with Office 365 groups!!!!

Webinar on the new features of SharePoint Online and OneDrive for Business :

Hi All,

Please join us for a webinar on May 19th ,2018 at 6:00 pm IST onĀ ā€Deep Dive into the new features of SharePoint Online and OneDrive for Business-Part 2ā€³

32590558_1905532662854198_2732364645032525824_n

Agenda:
This is continuity of our previous session on the same topic .If you haven’t attended Part 1 of this session you can view the recording from the link below . We will be discussing in detail about all the new features that has been rolled out by Microsoft for SharePoint Online and OneDrive for Business

Part 1 recording : _Ā https://youtu.be/LPohYbozOSM

Link to enroll for Part 2 :_Ā https://www.c-sharpcorner.com/events/deep-dive-into-the-new-features-of-sharepoint-online-and-onedrive-for-business-part-2

Thanks for enrolling yourself for this session !!!