In today’s digital age, securing company communications and data is paramount. While personal VPNs (Virtual Private Networks) such as Nord, Proton and Express VPN are often touted as a solution for online privacy and security, they are not suitable for protecting sensitive business information. Here are several reasons why you should not use a personal VPN for securing business communications … Read More
Hours and Holidays
Our normal support hours are Monday – Friday 8:30AM – 6:30PM Eastern Time, excluding public holidays. Customers with a 24×7 or extended hours contract will receive support according to their Service Level Agreement. On ’15 minute call back’ days, we do not man our telephones. Please leave a voicemail and a Technician will respond within 15 minutes. 2025 Calendar … Read More
Mailbox Delegation – Save Sent Items In Managers Mailbox
In Microsoft 365, it’s possible to configure delegate permissions on mailboxes so that a user, such as an executive assistant, can access and send emails on behalf of another user’s mailbox, such as a manager. With delegated access, the assistant can effectively manage the manager’s emails and calendar, including sending and responding to emails and meeting requests. By default, … Read More
Pro Tip – The Dispatch Board
In the fast-paced world of managed services, the PSA Dispatch board stands as a critical tool for maintaining technician efficiency, adhering to service level agreements and ultimately ensuring customer satisfaction. We’re a ConnectWise shop, so will focus on the ConnectWise Dispatch Board, however, we’ve used many other PSA’s and they all have something similar. In theory, these recommendations should hold … Read More
How To Send An Email From Or On Behalf Of If You Have “Send As” or “Send On Behalf” Permissions
What are Send As and Send On Behalf permissions? Send On Behalf permission allows a delegate to send messages on behalf of another user. It does not allow to open or access the contents of the mailbox in OWA or Outlook. Send As permissions allows anyone other than the mailbox owner to send email from this shared mailbox The difference between the Send … Read More
Why We Recommend DNS Filtering
The Cybersecurity Achilles’ Heel: DNS as an Attack Vector In the vast landscape of cybersecurity threats, the Domain Name System (DNS) often goes unnoticed. Yet, it’s a critical infrastructure component that, if compromised, can lead to devastating consequences. DNS is the internet’s phonebook, translating human-friendly domain names into IP addresses that computers use to communicate. However, this essential service can … Read More
Find Secure Token Users For macOS
What is a macOS secure token? A secure token on a Mac is an account attribute that permits users to perform critical operations on the macOS system, involving processes such as enabling FileVault, approving system and kernel extensions, and enforcing software updates. A secure token is automatically granted to the very first user account on a macOS device. Once the … Read More
Security Risks of Enabling Copilot
Microsoft 365 Copilot promises to be a productivity game-changer, offering AI-powered assistance within your familiar Microsoft 365 environment. But with any powerful tool, there are potential security risks to consider. At Diligex, we prioritize data security. Let’s take a deep dive into the security risks of enabling copilot and what you need to know before enabling Microsoft 365 Copilot. Understanding … Read More
Remote Access Portal Technical Issues
Feb 2 – 8:30AM: We are currently working to resolve an outage with our Remote Access system due to a system upgrade. We are actively working on the issue and will post updates here. There is no need to create a ticket. 9:26AM: Our Remote Access system vendor is looking into the issue. It is a critical P1 (priority 1) … Read More
How To Force an Intune Compliance Check For a Windows Device Via PowerShell
Intune is a great tool for managing and enforcing your devices within the Microsoft environment. However, if there is one thing that we consider a pain point, it’s compliance checks. By default, Intune devices check in every 8 hours, which could be an issue if you are leveraging conditional access restrictions. For example, if a device falls out of compliance … Read More