Skip to Content

Conditional Access

Ramblings of someone who deploys MS EMS.

Conditional Access

Ramblings of someone who deploys MS EMS.

  • Home
  • Blog
Security

Some policies I use in Conditional Access

Lewis Barry October 22, 2025 No Comments

This site is called Conditional Access, and yet surprisingly, it has very little advice on what you should do for CA policies. I’ve stayed away from this subject on purpose;…

Security

How to prevent ransomware attacks using M365 Business Premium

Lewis Barry July 6, 2025 No Comments

To the average person who isn’t in the IT space, the world seems like a scary place when news coverage keeps talking about the number of “sophisticated” attacks which are…

Security

The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition

Lewis Barry May 20, 2025 No Comments

I’ve previously written about Windows Autopatch, and now that it’s included in Business Premium and EDU licenses, it made sense to write an updated post for MSPs to use to…

Strategy

Is a SOC service really what you need?

Lewis Barry February 14, 2025 No Comments

Security Operations Centre Their primary focus isn’t preventative protection. They are actually Monitoring, Detecting and Responding to threats. A SOC’s core expertise is not in security hardening practices; this element…

Security

Securing access to Windows 365 from a BYOD/Personal Device

Lewis Barry February 10, 2025 No Comments

Scenario: You have employees or contractors you’ve given a Windows 365 license to, Intune is managing those cloud devices just fine, but you want to ensure access to them is…

Security

How to deploy Defender for Endpoint: Windows

Lewis Barry February 1, 2025 No Comments

With Microsoft making a bigger name for itself in the security space in recent years, more and more are looking to utilise what they already pay for in their bundle…

Security

Allowing the Sonos app via an Intune Firewall configuration

Lewis Barry January 16, 2025 No Comments

Your office just got some new speakers, but you can’t get the Windows app to talk to it? This serves as a dual guide, firstly on how to create and…

Strategy

How to become CIS compliant

Lewis Barry January 2, 2025 No Comments

To most, the Center for Internet Security (CIS) are a provider of benchmarks and standards that one might wish to follow to increase the security of their IT environment. It’s…

Security

Defender for Office 365: Custom Anti-malware Rules for Archive File Types

Lewis Barry December 27, 2024 No Comments

With over 90% of business email compromise attacks originating from email, it makes sense to focus efforts on trying to reduce that line of entry… although first, you should lock…

Security Strategy

Zero Trust Workshop: Your Security Roadmap

Lewis Barry December 23, 2024 No Comments

It’s really hard to know where to start when you or your team are assigned the task of securing the company from cyber threats. If you’ve been in the game…

Posts pagination

1 2 3

Next Page »

Security

  • Some policies I use in Conditional Access
  • How to prevent ransomware attacks using M365 Business Premium
  • The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition
  • Securing access to Windows 365 from a BYOD/Personal Device
  • How to deploy Defender for Endpoint: Windows
  • Allowing the Sonos app via an Intune Firewall configuration
  • Defender for Office 365: Custom Anti-malware Rules for Archive File Types
  • Zero Trust Workshop: Your Security Roadmap
  • Attack Surface Reduction – Action Required!
  • Browser Extension lockdown
  • Using Intune to remove Local Admins
  • Your password doesn’t meet the complexity requirements.

Modern Workplace

  • My Windows Autopatch Experience
  • What is your RMM actually doing?
  • Your password doesn’t meet the complexity requirements.
  • Self-Service freedom: Company Portal
  • Let Autopilot and Intune do the work.
  • Why Microsoft Edge is the best browser for business
  • Microsoft 365 Business Premium is the baseline.

Strategy

  • Is a SOC service really what you need?
  • How to become CIS compliant
  • Zero Trust Workshop: Your Security Roadmap

Licensing

  • How to buy Defender for Endpoint
  • Microsoft 365 Business Premium is the baseline.

Scripts

  • Get a list of Intune devices that haven’t synced in X days

Recent Posts

Security

Some policies I use in Conditional Access

Security

How to prevent ransomware attacks using M365 Business Premium

Security

The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition

Strategy

Is a SOC service really what you need?

Conditional Access

Ramblings of someone who deploys MS EMS.

Copyright © All rights reserved | Blogus by Themeansar.