


This task is harder than it seems because announcements are spread across the message center in the Microsoft 365 admin center, blog posts issued by individual development groups, plus some corporate news posts. In a nutshell, you need to keep an eye on Microsoft announcements and updates to know when things will happen. Microsoft 365 and Office 365 license prices increase on March 1, 2022, so now’s a great time to review the license mix within a tenant to eliminate unused licenses.The Azure AD license management cmdlets will stop working after June 30, 2022, which might impact PowerShell scripts used to assign and remove licenses from Microsoft 365 accounts.Exchange Online will also introduce a legacy SMTP endpoint sometime during 2022 to enable those who need to continue using TLS 1.0/1.1 connections to send SMTP email to keep working. Mail-enabled recipients with hard-coded plus addresses must be updated before Microsoft switches plus addressing on. Exchange Online will enable plus addressing for all tenants in January 2022.IE11 browser support finishes on J(support already terminated for IE11 in Microsoft 365 on August 17, 2021).A quick browse of recent announcements include: Keeping track of important dates for feature deprecation, retirement, and announcements across an ecosystem like Microsoft 365 can take some effort. Tracking Important Dates across Microsoft 365 Tracking Important Dates across Microsoft 365.In addition, the Exchange Team highlights the fix for Outlook vulnerability CVE-2023-23397, and the availability of a script to analyze whether mailboxes have been targeted by potentially malicious messages. However, it is rated as “Exploitation More Likely” so make sure you update as soon as possible! The vulnerability isn’t currently publicly disclosed nor exploited. CVE-2023-21707: Remote Code Execution Vulnerability.The updates fix the following vulnerabilities Security updates have been released for Exchange 2013, Exchange 2016 and Exchange 2019.
