Skip to Content

Conditional Access

Ramblings of someone who deploys MS EMS.

Conditional Access

Ramblings of someone who deploys MS EMS.

  • Home
  • Blog
Strategy

What’s the actual risk of using AI?

Lewis Barry January 27, 2026 No Comments

We keep being told AI is dangerous, that we should be careful, and invest in loads of ramp up projects and tools to help us “adopt” AI, but what does…

Licensing

Does M365 E3 help a scaling business?

Lewis Barry November 9, 2025 No Comments

July 2026 Licensing updates: M365 E3 will contain Defender for Office 365 P1. Meaning the only step-up required to match BP levels of endpoint security is related to EDR. Back…

Security

Some policies I use in Conditional Access

Lewis Barry October 22, 2025 No Comments

This site is called Conditional Access, and yet surprisingly, it has very little advice on what you should do for CA policies. I’ve stayed away from this subject on purpose;…

Security

How to prevent ransomware attacks using M365 Business Premium

Lewis Barry July 6, 2025 No Comments

To the average person who isn’t in the IT space, the world seems like a scary place when news coverage keeps talking about the number of “sophisticated” attacks which are…

Security

The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition

Lewis Barry May 20, 2025 No Comments

I’ve previously written about Windows Autopatch, and now that it’s included in Business Premium and EDU licenses, it made sense to write an updated post for MSPs to use to…

Strategy

Is a SOC service really what you need?

Lewis Barry February 14, 2025 No Comments

Security Operations Centre Their primary focus isn’t preventative protection. They are actually Monitoring, Detecting and Responding to threats. A SOC’s core expertise is not in security hardening practices; this element…

Security

Securing access to Windows 365 from a BYOD/Personal Device

Lewis Barry February 10, 2025 No Comments

Scenario: You have employees or contractors you’ve given a Windows 365 license to, Intune is managing those cloud devices just fine, but you want to ensure access to them is…

Security

How to deploy Defender for Endpoint: Windows

Lewis Barry February 1, 2025 No Comments

With Microsoft making a bigger name for itself in the security space in recent years, more and more are looking to utilise what they already pay for in their bundle…

Security

Allowing the Sonos app via an Intune Firewall configuration

Lewis Barry January 16, 2025 No Comments

Your office just got some new speakers, but you can’t get the Windows app to talk to it? This serves as a dual guide, firstly on how to create and…

Strategy

How to become CIS compliant

Lewis Barry January 2, 2025 No Comments

To most, the Center for Internet Security (CIS) are a provider of benchmarks and standards that one might wish to follow to increase the security of their IT environment. It’s…

Posts pagination

1 2 3

Next Page »

Security

  • Some policies I use in Conditional Access
  • How to prevent ransomware attacks using M365 Business Premium
  • The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition
  • Securing access to Windows 365 from a BYOD/Personal Device
  • How to deploy Defender for Endpoint: Windows
  • Allowing the Sonos app via an Intune Firewall configuration
  • Defender for Office 365: Custom Anti-malware Rules for Archive File Types
  • Zero Trust Workshop: Your Security Roadmap
  • Attack Surface Reduction – Action Required!
  • Browser Extension lockdown
  • Using Intune to remove Local Admins
  • Your password doesn’t meet the complexity requirements.

Modern Workplace

  • My Windows Autopatch Experience
  • What is your RMM actually doing?
  • Your password doesn’t meet the complexity requirements.
  • Self-Service freedom: Company Portal
  • Let Autopilot and Intune do the work.
  • Why Microsoft Edge is the best browser for business
  • Microsoft 365 Business Premium is the baseline.

Strategy

  • What’s the actual risk of using AI?
  • Is a SOC service really what you need?
  • How to become CIS compliant
  • Zero Trust Workshop: Your Security Roadmap

Licensing

  • Does M365 E3 help a scaling business?
  • How to buy Defender for Endpoint
  • Microsoft 365 Business Premium is the baseline.

Scripts

  • Get a list of Intune devices that haven’t synced in X days

Recent Posts

Strategy

What’s the actual risk of using AI?

Licensing

Does M365 E3 help a scaling business?

Security

Some policies I use in Conditional Access

Security

How to prevent ransomware attacks using M365 Business Premium

Conditional Access

Ramblings of someone who deploys MS EMS.

Copyright © All rights reserved | Blogus by Themeansar.

Manage Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may affect certain features and functions.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}