blog.atwork.at

news and know-how about microsoft, technology, cloud and more.

Upgrade to Delegate365 v10 - The Future of Microsoft 365 Delegated Management

We are thrilled to announce Delegate365 version 10, the most advanced release of our SaaS solution for delegated Microsoft 365 management. Delegate365 version 9 has reached its end of life and will no longer receive updates. All Delegate365 environments will be updated to version 10 by November 30th, 2025. To continue using the service without interruption, customers and their administrators must complete a quick setup after the upgrade.

Delegate365-September Update: New Feature-Message Quarantine

We’re pleased to introduce a powerful new feature in Delegate365 v10 that significantly extends the platform’s capabilities: Message Quarantine. This feature brings advanced security controls to Delegate365, enabling administrators to manage quarantined messages with greater precision and oversight.

Delegate365-August Updates: Enhanced Features and Improvements

We are excited to announce the latest enhancements to Delegate365, designed to make your Microsoft 365 management even more intuitive and powerful. Building on the momentum of the recent releases, the August update introduces several user-driven improvements that provide additional productivity.

Troubleshoot Delegate365 Insufficient privileges to complete the operation

When managing devices through the Delegate365 application that integrates with Microsoft Intune, you might encounter the error "Insufficient privileges to complete the operation", This issue may occur during specific operations if the Delegate365 setup has been used a longer time ago, or if the Global Administrator role has been removed from the Delegate 365 application by a Microsoft 365 administrator. In such cases, the administrator must reassign the necessary role to the application. The process for doing so is outlined below.

Comparing Delegate365 Versions: v9 vs. v10

Delegate365 is a powerful web-based solution for managing Microsoft 365 tenants, offering a range of features designed to streamline user, group, license management, and more resource management. Both Delegate365 versions are identical in their core features, but v10 includes some improvements and will be continued. Upgrade soon!

Delegate365-January Updates: Sync with AU´s, Devices Management, Company defaults and more

The latest update to Delegate365 v10 includes numerous small but impactful changes designed to improve the user experience and functionality. With the addition of new fields and features, administrators can now manage their tasks more efficiently. These improvements reflect our commitment to continuous innovation and user satisfaction. See the changes here.

Delegate365-License Aggregation Report Update

Delegate365 faced significant challenges in managing license data reports due to its daily storage practices. The root cause was the accumulation of an excessive amount of license data over the years, which exceeded the available resources. So we changed that and the License Aggregation Report in Delegate365 got an update.

Introducing the new and improved Delegate365: A modern SaaS solution for efficient, delegated management of an M365 tenant

We are thrilled to announce the launch of the latest version of our Software-as-a-Service solution, Delegate365 (delegate365.com). This brand-new iteration is designed to provide a faster, more modern, and highly efficient delegated management experience. Available now for testing, Delegate365 is here to transform how you manage and delegate your Microsoft 365 environment.

Use Delegate365 with Privileged Identity Management (PIM)

In today’s digital landscape, managing privileged access to applications is crucial for maintaining security and compliance. Microsoft Entra Privileged Identity Management (PIM) offers a robust solution to manage, control, and monitor access within your organization. In this guide, we’ll walk you through the process of configuring Microsoft Entra PIM for your application, Delegate365, ensuring that only authorized users can access it through a security group.