Some policies I use in Conditional Access
This site is called Conditional Access, and yet surprisingly, it has very little advice on what you should do for CA policies. I’ve stayed away from this subject on purpose;…
This site is called Conditional Access, and yet surprisingly, it has very little advice on what you should do for CA policies. I’ve stayed away from this subject on purpose;…
To the average person who isn’t in the IT space, the world seems like a scary place when news coverage keeps talking about the number of “sophisticated” attacks which are…
I’ve previously written about Windows Autopatch, and now that it’s included in Business Premium and EDU licenses, it made sense to write an updated post for MSPs to use to…
Scenario: You have employees or contractors you’ve given a Windows 365 license to, Intune is managing those cloud devices just fine, but you want to ensure access to them is…
With Microsoft making a bigger name for itself in the security space in recent years, more and more are looking to utilise what they already pay for in their bundle…
Your office just got some new speakers, but you can’t get the Windows app to talk to it? This serves as a dual guide, firstly on how to create and…
With over 90% of business email compromise attacks originating from email, it makes sense to focus efforts on trying to reduce that line of entry… although first, you should lock…
It’s really hard to know where to start when you or your team are assigned the task of securing the company from cyber threats. If you’ve been in the game…
If it is your job to manage and secure Windows endpoints and you aren’t aware of ASR rules, you need to start moving towards learning what they are, then getting…
Whether you use Edge, Chrome, Firefox, or some other obscure browser, managing extensions is a crucial part of protecting your users and assets. Window Shopping There are over 150,000 web…