The smarter way to manage Microsoft 365. Try AdminDroid for free!
2025 Recap: Updates, Automation & Smarter Mangement

2025 Recap: Updates, Automation & Smarter Mangement

Stepping into 2026, admins must get ready for another year of balancing AI adoption, securing sensitive resources, and managing constant change across Microsoft 365. To tackle these challenges, we will continue walking this journey with you, just as we always have – through consistent updates, scripts you can rely on, productivity tips, and more.

Before moving ahead, let’s take a moment to look back at what we delivered in 2025 and how we helped simplify your admin life.

We’ve categorized the top blogs published in 2025 as below:

New Updates & Feature Enhancements

For admins, staying on top of Microsoft 365 updates is essential for maintaining security and compliance. This year, we went the extra mile to deliver timely insights on the latest enhancements, helping you adopt changes with clarity.

1. Set Up Verification Checks in Microsoft Teams Meetings

Anonymous users can join Teams Meetings when meeting links are forwarded outside the organization, posing a security risk. Microsoft introduced verification checks (CAPTCHA) to ensure only verified participants can join.

Keep your Teams meetings safe from unknown attendees – enable verification checks in your meeting policies.

2. Detect Sensitive Content During Screen Sharing in Microsoft Teams Meetings

Accidental exposure of sensitive files during Teams meetings can be risky. By enabling the “Detect sensitive content during screen sharing” option in meeting policies – via Teams Admin Center or PowerShell, you can prevent unintentional data leaks.

No more sensitive data disclosure during screen sharing! Turn on sensitive content detection to avoid accidental exposure.

Security Configurations & Protection

Configuring the right security settings is crucial for protecting your organization from evolving threats. This category brings together blogs focused on access control and threat prevention. It helps you safeguard sensitive resources and secure the Microsoft 365 environment.

Access Control

Controlling user access and limiting excessive permissions is essential to prevent unauthorized access and protect sensitive data.

1. How to Find the Right Scope for Microsoft Graph Cdmlets

When creating scripts or automating tasks with Microsoft Graph cmdlets, it’s easy to grant excessive privileges to avoid permission errors. This can unintentionally expose tenant data. Assigning only the necessary permissions ensures security and aligns with the principle of least privilege.

Want to prevent high privilege permissions? Find the right scope for Microsoft Graph cmdlets and assign it properly.

2. Limit Application Permissions to Specific Mailboxes

Applications in Microsoft 365 often need mailbox access to automate tasks, but granting broad permissions can expose crucial data across the organization. Restricting access to only the required mailboxes helps protect confidential information.

Don’t let the application access your admin mailbox! Limit application permissions to specific mailboxes to avoid tenant-wide exposure.

3. Manage Authentication Methods for a User Using PowerShell

With MFA now mandatory for all users, admins need to ensure smooth authentication. Managing methods like Windows Hello for Business, Temporary Access Pass, Microsoft Authenticator, Passkeys, and FIDO2 helps maintain security and usability.

Need better visibility into how users authenticate? Manage authentication methods for a user to review, update, or remove less secure methods efficiently.

Threat Prevention

With emerging threats evolving alongside AI, protecting tenant data is increasingly challenging. These blogs provide detailed guidance on preventing threats, helping admins safeguard their organizations effectively.

4. How to Block AI Agents in Microsoft 365

AI agents like Microsoft Copilot and Azure AI Foundry help automate tasks, but uncontrolled usage can lead to unwanted access to crucial accounts. Admins need to monitor and manage these agents to maintain security.

Is your tenant’s crucial data at risk? Block AI agents in Microsoft 365 to avoid high privilege grants and secure data.

5. Restrict Attachment Downloads in OWA Using CA Policy

With BYOD policies, users often access emails and attachments from personal devices, increasing the risk of sensitive data visibility. Conditional Access policies let admins restrict attachment downloads on unmanaged devices, keeping critical information secure.

No more sensitive data downloads on unmanaged devices! Restrict attachment downloads in OWA using CA policy to prevent critical data exposure.

6. How to Encrypt Email Messages with Mail Flow Rules in Exchange Online

Emails often contain sensitive information like financial data or confidential documents. Using Exchange Online mail flow rules, admins can enforce email encryption to protect data and ensure confidentiality.

Keep your sensitive data confidential by encrypting emails using mail flow rules in your organization.

7. How to Create Adaptive Scopes in Microsoft Purview

Manually assigning compliance policies in Microsoft 365 can be time-consuming and error-prone, when users move between departments, onboarding, and offboarding. Adaptive scopes in Microsoft Purview solve this by automatically adjusting policies as your organization changes, ensuring policies are always applied to the right users and sites.

Learn how to create adaptive scopes in Microsoft Purview to automate policy management and maintain compliance.

PowerShell Solutions – When the UI Falls Short

Some administrative tasks in Microsoft 365, especially bulk actions, can be cumbersome or not possible through the Admin Center UI. This collection highlights top PowerShell solutions that help admins tackle scenarios the UI can’t handle, saving time and enhancing control.

1. Manage Entra Application Permissions Using PowerShell

Excess permissions granted to Entra applications can expose critical resources in the organization. Admins should regularly review and assign only the permissions required for each application.

Do your applications have excess access to tenant data? Efficiently manage Entra application permissions using PowerShell and stop unwanted access.

2. Manage Admin Roles Using Microsoft Graph PowerShell

Admin roles grant powerful privileges in a tenant and should be assigned carefully. Temporary access may be needed for specific tasks, but roles should be revoked afterward to prevent unauthorized access to critical data.

Prevent unnecessary admin access by efficiently managing admin roles with Microsoft Graph PowerShell.

3. Manage Permission Levels in SharePoint Online Using PowerShell

SharePoint sites are often shared internally and externally for collaboration, but giving users more permissions than necessary can lead to data misuse. Admins should assign only the required permission levels to uphold least-privilege principles.

No more excessive permissions to SharePoint sites! Manage permission levels in SharePoint Online using PowerShell and save time from tedious UI processes.

4. Manage Groups Using Microsoft Entra PowerShell Module

Groups in Microsoft 365 serve many purposes, but issues like unwanted group creation, accidental deletion, or unnecessary member changes need careful oversight. Managing these tasks via the Admin Center can be cumbersome, especially for large organizations. PowerShell enables admins to handle groups efficiently, including bulk actions.

Tired of managing groups through Admin Center? Let’s solve challenging cases by managing groups using PowerShell and save time.

5. How to Create and Manage Address Book Policies in Exchange Online

In large organizations, searching the Global Address List (GAL) can be overwhelming. Address Book Policies (ABPs) let admins segment users by departments, groups, or other criteria, making it easier to find contacts while enhancing privacy and compliance.

Learn how to manage address book policies in Exchange Online to enhance privacy and compliance.

6. How to Stop Users from Sharing their Own Calendar

By default, Outlook allows users to share their calendars, which can lead to accidental exposure of meeting details, locations, and more. Admins need to control calendar visibility, especially for high-privileged accounts. While the Admin Center has limitations, PowerShell provides bettersolution to enforce these settings.

See how to stop users from sharing their own calendars and prevent unintentional sharing of sensitive data to anonymous users.

Tenant Management & Streamlined Administration

Effective management and governance are key to keep your Microsoft 365 environment organized and running smoothly. This category features blogs on tasks like managing groups, restoring deleted objects, recovering emails, and generating Entra access package reports to help admins streamline daily operations.

1. Get Entra Access Package Report Using PowerShell

Microsoft Entra ID access packages simplify administrative tasks by ensuring the right users receive the right resources at the right time. By following the principle of least privilege, they help prevent unnecessary access to critical data. What if a basic-level employee accidentally gains access to sensitive information? That’s where effective monitoring is essential.

In this blog, you’ll learn how to generate the most important Entra access package reports using PowerShell, enabling admins to track, review, and manage access with ease.

With Entra access package reports, you can confidently verify that users have only the access they need.

2. Restore Deleted Objects Using Microsoft Entra PowerShell

Accidental deletion of critical resources, such as users, groups, or app registration is a common concern for administrators. To restore deleted objects effectively, admins can use Microsoft Entra’s soft delete feature, providing a 30-day recovery window before they’re permanently removed.

Don’t let critical resources slip through your hands. Using Microsoft Entra PowerShell, you can quickly restore deleted objects and regain access to sensitive resources before it’s too late.

3. How to Manage Apps and Service Principal Objects Using Microsoft Entra PowerShell

With the deprecation of the Azure AD module, managing applications and service principals in Microsoft 365 has become more challenging for administrators. To ensure a smooth transition, admins can leverage Microsoft Entra PowerShell for efficient and modern app management.

Learn how to manage apps and service principals using Entra PowerShell – from creation, assigning ownership, granting permissions, and deleting the objects.

4. How to Recover Deleted Emails from Microsoft 365

Accidental deletion of important emails is a common issue for users. To avoid crucial data getting deleted, admins must audit email deletions in Exchange Online. Also, they can recover required messages, including permanently deleted emails or those removed automatically by retention policies.

Protect critical business communications by recovering deleted emails using Exchange Online and ensuring no important data is lost.

5. How to Manage Channel Policies in Microsoft Teams

Allowing users to create Teams channels is essential for focused collaboration. However, unrestricted creation, especially private channels, can lead to sensitive data being shared without proper oversight. To prevent this, administrators can effectively control channel creation using Microsoft Teams channel policies.

By managing Teams channel policies, admins can govern how users create and use channels while maintaining security and compliance.

Work Smarter with Productivity Tips

Discover practical tips and strategies to boost efficiency and simplify workflow in Microsoft 365. These insights help you optimize everyday tasks, streamline processes, and get more done with less effort.

1. How to Use Approvals App in Microsoft Teams

Struggling to track approval requests scattered across emails and chats? Delayed or overlooked approvals can slow down decisions and impact productivity. The Approvals app in Microsoft Teams solves this by centralizing all approval workflows in one place. Users can create, manage, and respond to approvals directly within Teams—without switching between tools.

Learn how to use the Approvals app in Microsoft Teams and prevent tasks from getting stuck in approval queues.

2. How to Schedule a Meeting with Scheduling Poll in Outlook

Scheduling a meeting in a large team can be challenging—checking everyone’s availability, reviewing room calendars, and finding a time that works for all. It often takes more effort than expected. The Scheduling Poll in Outlook makes this easier by letting attendees vote on their preferred meeting times.

Discover how Scheduling Poll in Outlook works and how it helps you find the best meeting time based on attendees’ availability.

3. How to Set Immutable ID to Null Using MS Graph

In a hybrid setup, the Immutable ID links an on-premises AD account to its Microsoft Entra ID (Azure AD) cloud account. During scenarios like migration to a cloud-only setup, you may need to clear this Immutable ID to ensure the account can be re-synced or properly managed in the cloud environment.

Learn how to set a user’s Immutable ID to null using Microsoft Graph to ensure a seamless transition from a hybrid to a cloud-only environment.

4. Receive Emails on Unlicensed Admin Accounts Using Mail Flow Rules

Organizations often create unlicensed admin accounts in Microsoft 365 to save on licenses, but these accounts can’t receive emails by default. This means important messages—like alerts, policy updates, and service notifications—may be missed. Using Exchange Online mail flow rules, you can redirect emails to these accounts, ensuring admins stay informed without adding extra licenses.

Find out how to receive emails on unlicensed admin accounts and prevent email disruption.

5. How to Delete Recurring Meetings Scheduled by Former Employees in Microsoft 365

Recurring meetings in Microsoft 365 keep teams on track, but when the organizer leaves, these repeating events can clutter calendars and cause confusion. Removing unnecessary recurring meetings ensures schedules stay clean and relevant.

Learn how to delete recurring meetings set up by former employees and keep your team’s calendar organized.

Advanced Admin Control & Fixes

Master advanced administrative techniques and tackle scenarios where standard settings or processes just don’t cut it. Learn how to fine-tune controls and resolve common issues to keep your Microsoft 365 environment running smoothly.

1. How to Set Up Room Finder in Outlook

Booking meeting rooms in Microsoft 365 can be tricky—oversized or unavailable rooms lead to scheduling conflicts. Room Finder in Outlook helps you quickly find rooms by capacity, location, and availability, making meetings easier to plan.

Learn how to set up Room Finder in Outlook to optimize space usage and streamline scheduling.

Sometimes, while scheduling meetings with Room Finder, users might not find rooms displaying in the Room finder. Find out how to fix ‘Room finder not displaying rooms in Outlook’ issue and the major causes, enabling effective usage of Room Finder feature.

2. How to Manage Unique Permissions in SharePoint Online

SharePoint Online uses permission inheritance by default, but sometimes you need more control. Unique permissions let you grant or restrict access to specific files, folders, etc., securing sensitive content and ensuring the right people have the right access.

Learn how to manage unique permissions in SharePoint Online to maintain security and control over your site’s content.

Hope this blog helped you to look back at what’s new, what is important to configure, powerful solutions, productivity tips, and more. Let us know which one you found helpful or interesting through the comments section.

2025 Recap: Updates, Automation & Smarter Mangement

by Sruthy time to read: 9 min
0