Security
This site is called Conditional Access, and yet surprisingly, it has very little advice on what you should do for CA policies. I've stayed away from this subject on purpose; it's very hard to…
Read more about Some policies I use in Conditional Access
To the average person who isn't in the IT space, the world seems like a scary place when news coverage keeps talking about the number of "sophisticated" attacks which are destroying businesses…
Read more about How to prevent ransomware attacks using M365 Business Premium
I've previously written about Windows Autopatch, and now that it's included in Business Premium and EDU licenses, it made sense to write an updated post for MSPs to use to get their clients Cyber…
Read more about The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition
Scenario: You have employees or contractors you've given a Windows 365 license to, Intune is managing those cloud devices just fine, but you want to ensure access to them is validated often, and…
Read more about Securing access to Windows 365 from a BYOD/Personal Device
With Microsoft making a bigger name for itself in the security space in recent years, more and more are looking to utilise what they already pay for in their bundle SKUs like Business Premium/M365…
Read more about How to deploy Defender for Endpoint: Windows
Your office just got some new speakers, but you can't get the Windows app to talk to it? This serves as a dual guide, firstly on how to create and deploy firewall rules using Intune, and secondly how…
Read more about Allowing the Sonos app via an Intune Firewall configuration
It's really hard to know where to start when you or your team are assigned the task of securing the company from cyber threats. If you've been in the game a while, you've probably noticed that cyber…
Read more about Zero Trust Workshop: Your Security Roadmap
If it is your job to manage and secure Windows endpoints and you aren't aware of ASR rules, you need to start moving towards learning what they are, then getting them all configured in block mode*.
Read more about Attack Surface Reduction - Action Required!
Whether you use Edge, Chrome, Firefox, or some other obscure browser, managing extensions is a crucial part of protecting your users and assets. Window Shopping … There are over 150,000 web…
Read more about Browser Extension lockdown
In one way or another, end-users sometimes find themselves as members of the built-in Administrators group on Windows. We can use Intune to clean that up, while retaining access for Global…
Read more about Using Intune to remove Local Admins
8 characters or more, some special, throw some numbers in there, and rotate often. Pretty much the standard advice for creating passwords for as long as computer systems have existed. I want to talk…
Read more about Your password doesn't meet the complexity requirements.