Using Send-MgUserMail as the Send-MailMessage replacement

I used the Send-MailMessage cmdlet a lot in the past for testing Receive Connectors in Exchange or emailing reports in scheduled PowerShell scripts. When you try to use the Send-MailMessage cmdlet, it has been showing you this message for quite a while now: WARNING: The command 'Send-MailMessage' is obsolete. This cmdlet does not guarantee secure connections to SMTP servers. While no immediate replacement is available in PowerShell, we recommend you not use Send-MailMessage. See https://aka.ms/SendMailMessage for more information. In this blog post, I will show you the new way of sending emails using Send-MgUserMail.

Retrieving all cmdlets and help URLs from the new Microsoft Graph API modules

Things are changing... The Azure AD and MSOL modules will be getting a deprecated status. This was initially set for June 2022 and postponed until after December 2022. It would be best if you started updating scripts, be prepared for that. In this blog post, I wanted to show you how to collect all the new cmdlets and their description, synopsis (A summary), and the help URL for more information.

Get 365 Service Health status using PowerShell and MS-Graph

We have all been there, you're working on something (Microsoft Endpoint Manager, for example), and things don't work like they are supposed to. Strange errors, you're starting to doubt yourself... And then you see something in your newsfeed (Twitter, LinkedIn, etc.) that there's an issue and that Microsoft is working on it... You lost a few hours troubleshooting your issue. Wouldn't it be nice to get notified when starting PowerShell if there's an issue you should be aware of? This blog post will cover just that 🙂

Adding Mobile Phone Authentication method for Azure AD Multi-Factor Authentication using PowerShell

One of our customers is switching from Mobile Iron to Endpoint Manager for their mobile devices, which is a good choice :). After retiring the device, Mobile Iron removes the managed Authenticator app from the device. Microsoft Endpoint manager pushes it back to the device again, but... The iCloud backup options were not set/managed, and users had to add their account back which requires MFA. Which they can't do because only the Authenticator app was registered (Mobile app code) and no recovery email or mobile phone number. But the mobile phone numbers were set on most users in Active Directory in the past and were synced to Azure AD. This blog post describes how you can add those numbers to the affected users so that they can use the recovery option and won't have to contact the ServiceDesk 🙂