Lokesh
Blogs, Articles, and Posts
Export All App Registrations with Certificates and Secrets in Microsoft Entra
(o365reports.com)
Imagine spending your afternoon sifting through dozens of app registrations in Entra ID to determine
By: Lokesh submitted:Feb 28 2025
Imagine spending your afternoon sifting through dozens of app registrations in Entra ID to determine
which ones are still active, and which are relics from past projects. As an admin, you know that applications use certificates and secrets for app registrations to securely authenticate-but many of these credentials persist
By: Lokesh submitted:Feb 28 2025
How to Check Who Deleted Emails from Shared Mailbox in Microsoft 365
(o365reports.com)
With multiple users having access to Microsoft 365 shared mailboxes, the risk of important emails
By: Lokesh submitted:Mar 14 2025
With multiple users having access to Microsoft 365 shared mailboxes, the risk of important emails
disappearing is a real challenge. A single missing email can disrupt client interactions or halt progress in collaborative projects. Therefore, this blog will show you how to monitor shared mailbox email deletion to identify who...
By: Lokesh submitted:Mar 14 2025
Identify and Block Sign-in for Shared Mailboxes in Microsoft 365
(o365reports.com)
Shared and resource mailboxes in Microsoft 365 are designed for collaboration, not for direct
By: Lokesh submitted:Mar 28 2025
Shared and resource mailboxes in Microsoft 365 are designed for collaboration, not for direct
sign-ins. However, if sign-in remains enabled, attackers could exploit these accounts to bypass security policies, send unauthorized emails, or access confidential data-posing a serious compliance and security risk.
By: Lokesh submitted:Mar 28 2025
Track Microsoft Entra Application Operations Using PowerShell
(o365reports.com)
When applications are registered in Microsoft Entra, they are granted with surprising number of
By: Lokesh submitted:May 30 2025
When applications are registered in Microsoft Entra, they are granted with surprising number of
privileges like accessing sensitive data to acting on behalf of users. But these permissions aren't static. Once an app is registered, its configuration can evolve over time through various operational changes.
By: Lokesh submitted:May 30 2025