<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
	<title>Conditional Access -- Blog</title>
	<link>https://conditionalaccess.uk/blog/</link>
	<atom:link href="https://conditionalaccess.uk/blog/" rel="self" type="application/rss+xml" />
	<description>Latest posts</description>
	<pubDate>Wed, 29 Apr 2026 12:30:43 +0000</pubDate>
	<ttl>60</ttl>
	<item>
		<title>What&#x00027;s included in M365 Business Premium?</title>
		<description><![CDATA[Microsoft 365 Business Premium is a &#x00022;business in a box&#x00022;. Configured correctly, you can prevent almost all business compromise attacks while giving users the familiar productivity suite they all know and (sometimes) love.]]></description>
		<pubDate>Thu, 12 Mar 2026 20:11:24 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/whats-included-in-m365-business-premium/</link>
		<guid>https://conditionalaccess.uk/blog/whats-included-in-m365-business-premium/</guid>
	</item>
	<item>
		<title>What&#x00027;s the actual risk of using AI?</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:18 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/whats-the-actual-risk-of-using-ai/</link>
		<guid>https://conditionalaccess.uk/blog/whats-the-actual-risk-of-using-ai/</guid>
	</item>
	<item>
		<title>Does M365 E3 help a scaling business?</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:17 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/does-m365-e3-help-a-scaling-business/</link>
		<guid>https://conditionalaccess.uk/blog/does-m365-e3-help-a-scaling-business/</guid>
	</item>
	<item>
		<title>Some policies I use in Conditional Access</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:17 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/some-policies-i-use-in-conditional-access/</link>
		<guid>https://conditionalaccess.uk/blog/some-policies-i-use-in-conditional-access/</guid>
	</item>
	<item>
		<title>How to prevent ransomware attacks using M365 Business Premium</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:16 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/how-to-prevent-ransomware-attacks-using-m365-business-premium/</link>
		<guid>https://conditionalaccess.uk/blog/how-to-prevent-ransomware-attacks-using-m365-business-premium/</guid>
	</item>
	<item>
		<title>The Cyber Essentials Guide for Windows OS and Driver Patching: Intune Edition</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:12 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/the-cyber-essentials-guide-for-windows-os-and-driver-patching-intune-edition/</link>
		<guid>https://conditionalaccess.uk/blog/the-cyber-essentials-guide-for-windows-os-and-driver-patching-intune-edition/</guid>
	</item>
	<item>
		<title>Is a SOC service really what you need?</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:11 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/do-i-need-a-soc/</link>
		<guid>https://conditionalaccess.uk/blog/do-i-need-a-soc/</guid>
	</item>
	<item>
		<title>Securing access to Windows 365 from a BYOD/Personal Device</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:09 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/securing-access-to-windows-365-from-a-byod-personal-device/</link>
		<guid>https://conditionalaccess.uk/blog/securing-access-to-windows-365-from-a-byod-personal-device/</guid>
	</item>
	<item>
		<title>How to deploy Defender for Endpoint: Windows</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:58 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/how-to-deploy-defender-for-endpoint-windows/</link>
		<guid>https://conditionalaccess.uk/blog/how-to-deploy-defender-for-endpoint-windows/</guid>
	</item>
	<item>
		<title>Allowing the Sonos app via an Intune Firewall configuration</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:41 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/allowing-the-sonos-app-via-an-intune-firewall-configuration/</link>
		<guid>https://conditionalaccess.uk/blog/allowing-the-sonos-app-via-an-intune-firewall-configuration/</guid>
	</item>
	<item>
		<title>How to become CIS compliant</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:00 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/how-to-become-cis-compliant/</link>
		<guid>https://conditionalaccess.uk/blog/how-to-become-cis-compliant/</guid>
	</item>
	<item>
		<title>Zero Trust Workshop: Your Security Roadmap</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:05 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/zero-trust-workshop-your-security-roadmap/</link>
		<guid>https://conditionalaccess.uk/blog/zero-trust-workshop-your-security-roadmap/</guid>
	</item>
	<item>
		<title>My Windows Autopatch Experience</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:12:00 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/my-windows-autopatch-experience/</link>
		<guid>https://conditionalaccess.uk/blog/my-windows-autopatch-experience/</guid>
	</item>
	<item>
		<title>Attack Surface Reduction - Action Required!</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:52 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/attack-surface-reduction-action-required/</link>
		<guid>https://conditionalaccess.uk/blog/attack-surface-reduction-action-required/</guid>
	</item>
	<item>
		<title>Browser Extension lockdown</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:55 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/browser-extension-lockdown/</link>
		<guid>https://conditionalaccess.uk/blog/browser-extension-lockdown/</guid>
	</item>
	<item>
		<title>Using Intune to remove Local Admins</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:50 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/using-intune-to-remove-local-admins/</link>
		<guid>https://conditionalaccess.uk/blog/using-intune-to-remove-local-admins/</guid>
	</item>
	<item>
		<title>How to buy Defender for Endpoint</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:50 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/how-to-buy-defender-for-endpoint/</link>
		<guid>https://conditionalaccess.uk/blog/how-to-buy-defender-for-endpoint/</guid>
	</item>
	<item>
		<title>What is your RMM actually doing?</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:49 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/what-is-your-rmm-actually-doing/</link>
		<guid>https://conditionalaccess.uk/blog/what-is-your-rmm-actually-doing/</guid>
	</item>
	<item>
		<title>Your password doesn&#x00027;t meet the complexity requirements.</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:48 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/your-password-doesnt-meet-the-complexity-requirements/</link>
		<guid>https://conditionalaccess.uk/blog/your-password-doesnt-meet-the-complexity-requirements/</guid>
	</item>
	<item>
		<title>Self-Service freedom: Company Portal</title>
		<description><![CDATA[]]></description>
		<pubDate>Fri, 27 Feb 2026 18:11:43 +0000</pubDate>
		<link>https://conditionalaccess.uk/blog/self-service-freedom-company-portal/</link>
		<guid>https://conditionalaccess.uk/blog/self-service-freedom-company-portal/</guid>
	</item>
</channel>
</rss>
1