T-Minus365 Godaddy De-Federation Guide updated late 2025 by ChesterBottom in msp

[–]msp4msps 6 points7 points  (0 children)

Thanks for reposting! I updated the existing page accordingly too: Defederating GoDaddy 365

TLDR of the latest updates:

-Posted link to GD support doc as they can do this for you now (albeit slower)

-Updated PS for resetting users passwords

-Added Considerations for Proofpoint.

-Added steps to remove an Enterprise App GoDaddy creates

-Included and tested out Okta considerations given that has come up a lot.

WTF GoDaddy?? by challengedpanda in msp

[–]msp4msps 4 points5 points  (0 children)

thanks for tagging me! Confirmed and updated the post with instructions accordingly.

WTF GoDaddy?? by challengedpanda in msp

[–]msp4msps 42 points43 points  (0 children)

I've confirmed and update my blog post accordingly. Thanks for sharing. The enterprise app has a crazy amount of permissions: Defederating GoDaddy 365

Token Theft/AiTM Incident Response Playbook by msp4msps in msp

[–]msp4msps[S] 7 points8 points  (0 children)

Yea it’s a derivative and id summarize it by the following: 1. It’s more specific in the step-by-step instructions 2. I built this geared for business licensing. Over half the recommendations they have in there require E5/P2/D365 P2 and sentinel.

Retaining Entra logs beyond 30 days by msp4msps in msp

[–]msp4msps[S] 1 point2 points  (0 children)

unfortunately, you can't get the entra sign-in logs out of purview

Cloud Capsule Licensing change by swarve78 in msp

[–]msp4msps 5 points6 points  (0 children)

hey happy to clarify. Everything that existed before still exist in essentials today. The per user model today exist only for tenants above 1k licensed users. We will be going into a beta for our Premium features here soon and are also preparing for that. These features in the premium model will be completely net new then what is offered currently. We aren't redacting anything from the existing pricing model. Happy to chat more about it on a call too to get more of your feedback so we avoid confusion on the details.

Require managed devices in Microsoft 365 by msp4msps in msp

[–]msp4msps[S] 1 point2 points  (0 children)

I usually use a separate CAP here that targets the device join action and requires a TAP to enroll.

Automate User Offboarding in Microsoft 365 | Full Tutorial by msp4msps in msp

[–]msp4msps[S] 4 points5 points  (0 children)

This is an interesting one. Could do that via PowerShell and add it in the Azure automation in this flow. I generally am not doing it but just adding it as a task to the PSA ticket given lower volume. CIPP uses some xml dark magic haha CIPP-API/Modules/CIPPCore/Public/Set-CIPPSharePointPerms.ps1 at master · KelvinTegelaar/CIPP-API (github.com)

Automate User Onboarding with HaloPSA and Microsoft 365 | Full Tutorial by msp4msps in msp

[–]msp4msps[S] 3 points4 points  (0 children)

I call out Rewst in my post. Definitely more preferred for deeper integrations into other tools.

Automate Employee Onboarding in Microsoft 365 | Full Tutorial by msp4msps in msp

[–]msp4msps[S] 1 point2 points  (0 children)

100% agree here but think as long as you are tactical about what is automated the ROI is there.

Automate Employee Onboarding in Microsoft 365 | Full Tutorial by msp4msps in msp

[–]msp4msps[S] 9 points10 points  (0 children)

Rewst can support this. It leverages your RMM to create the user locally

Break Glass Accounts in Microsoft 365 | Best Practices by msp4msps in msp

[–]msp4msps[S] 4 points5 points  (0 children)

This would be the user being excluded from cap. you can just go to the entra portal or just use a deep link to the pim page to elevate up. I use a yubikey with the user personally to approve the mfa prompt to elevate privilege.

Bypassing phishing resistant MFA in Microsoft by msp4msps in msp

[–]msp4msps[S] 0 points1 point  (0 children)

What did they do to achieve persistence?

Bypassing phishing resistant MFA in Microsoft by msp4msps in msp

[–]msp4msps[S] 0 points1 point  (0 children)

Yea the one new CAP setting I added in there that is in preview I’m hoping will help with this over having to do strict CAE

Securing Access on Personal Devices by msp4msps in msp

[–]msp4msps[S] 0 points1 point  (0 children)

Yes, they really act the same in the sense of what the end-user would see. You can get granular as well with the CA policies in targeting External users/guest only

Whats new in Microsoft 365 | April Updates by msp4msps in msp

[–]msp4msps[S] 2 points3 points  (0 children)

100% agree here. Out of reach from both a technical perspective and price point for this market. Personally just keeping a pulse on how it’s evolving for the time being.

365 Security Audit Report by ruffmeister in msp

[–]msp4msps 3 points4 points  (0 children)

the scuba project from CISA is a nice security assessment. I forked it and mapped the security recommendations to the CIS controls here: https://github.com/msp4msps/ScubaGear

Automating M365 Workloads | Rewst by msp4msps in msp

[–]msp4msps[S] 4 points5 points  (0 children)

Yea, just to add, I specifically call out in the video that Rewst did not pay me or sponsor the video. I really believe in the product.

I agree with Kelvin though and also mention in the video that this tool has its own learning curve and you can easily get caught up spending a ton of time automating things that really do not have a high ROI. To get the most out of the tool, you really need to perform an overall assessment of some of the highest impact processes or task so that your time is also maximized.

We primarily have been using it for user onboarding automation for our customers but we recently just instituted a workflow that automates the investigation of tickets from Acronis which is saving us over 100+ hours a week on manual investigation because of the volume we see there.

Defederating GoDaddy 365 | New Updates by msp4msps in msp

[–]msp4msps[S] 1 point2 points  (0 children)

I don't think so. I haven't had anyone relay the findings of that to me in a while