Why You Should Not Use a Personal VPN

Graham CaparuloBlog

In today’s digital age, securing company communications and data is paramount. While personal VPNs (Virtual Private Networks) such as Nord, Proton and Express VPN are often touted as a solution for online privacy and security, they are not suitable for protecting sensitive business information. Here are several reasons why you should not use a personal VPN for securing business communications … Read More

Hours and Holidays

adminKnowledge Base

Our normal support hours are Monday – Friday 8:30AM – 6:30PM Eastern Time, excluding public holidays.   Customers with a 24×7 or extended hours contract will receive support according to their Service Level Agreement. On ’15 minute call back’ days, we do not man our telephones.  Please leave a voicemail and a Technician will respond within 15 minutes. 2025 Calendar … Read More

Mailbox Delegation – Save Sent Items In Managers Mailbox

Neil ChavezPro Tip

  In Microsoft 365, it’s possible to configure delegate permissions on mailboxes so that a user, such as an executive assistant, can access and send emails on behalf of another user’s mailbox, such as a manager. With delegated access, the assistant can effectively manage the manager’s emails and calendar, including sending and responding to emails and meeting requests. By default, … Read More

Pro Tip – The Dispatch Board

adminPro Tip

In the fast-paced world of managed services, the PSA Dispatch board stands as a critical tool for maintaining technician efficiency, adhering to service level agreements and ultimately ensuring customer satisfaction.  We’re a ConnectWise shop, so will focus on the ConnectWise Dispatch Board, however, we’ve used many other PSA’s and they all have something similar. In theory, these recommendations should hold … Read More

How To Send An Email From Or On Behalf Of If You Have “Send As” or “Send On Behalf” Permissions

Neil ChavezTech Tip

What are Send As and Send On Behalf permissions? Send On Behalf permission allows a delegate to send messages on behalf of another user. It does not allow to open or access the contents of the mailbox in OWA or Outlook. Send As permissions allows anyone other than the mailbox owner to send email from this shared mailbox The difference between the Send … Read More

Why We Recommend DNS Filtering

Graham CaparuloBlog

Why We Recommend DNS Filtering

The Cybersecurity Achilles’ Heel: DNS as an Attack Vector In the vast landscape of cybersecurity threats, the Domain Name System (DNS) often goes unnoticed. Yet, it’s a critical infrastructure component that, if compromised, can lead to devastating consequences. DNS is the internet’s phonebook, translating human-friendly domain names into IP addresses that computers use to communicate. However, this essential service can … Read More

Find Secure Token Users For macOS

Neil ChavezPro Tip

What is a macOS secure token? A secure token on a Mac is an account attribute that permits users to perform critical operations on the macOS system, involving processes such as enabling FileVault, approving system and kernel extensions, and enforcing software updates. A secure token is automatically granted to the very first user account on a macOS device. Once the … Read More

Security Risks of Enabling Copilot

Graham CaparuloBlog

Security Risks of Enabling Copilot

Microsoft 365 Copilot promises to be a productivity game-changer, offering AI-powered assistance within your familiar Microsoft 365 environment. But with any powerful tool, there are potential security risks to consider. At Diligex, we prioritize data security. Let’s take a deep dive into the security risks of enabling copilot and what you need to know before enabling Microsoft 365 Copilot. Understanding … Read More

Remote Access Portal Technical Issues

adminUncategorized

Feb 2 – 8:30AM: We are currently working to resolve an outage with our Remote Access system due to a system upgrade. We are actively working on the issue and will post updates here. There is no need to create a ticket. 9:26AM: Our Remote Access system vendor is looking into the issue. It is a critical P1 (priority 1) … Read More

How To Force an Intune Compliance Check For a Windows Device Via PowerShell

Neil ChavezPro Tip

Intune is a great tool for managing and enforcing your devices within the Microsoft environment. However, if there is one thing that we consider a pain point, it’s compliance checks. By default, Intune devices check in every 8 hours, which could be an issue if you are leveraging conditional access restrictions. For example, if a device falls out of compliance … Read More