My top policies for securing device registration in Microsoft 365
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally,…
Require managed devices in Microsoft 365
Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know…
Customer needs personal device access for Microsoft 365 | Secure Options
In today’s remote and hybrid workforce, we’re getting more pushback than ever from customers on preventing access to corporate resources…
What’s New in Microsoft 365 | October Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Getting started with email security in Microsoft 365 | Phishing protections
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes…
How to Protect against Token Theft | Conditional Access
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
Automate User Offboarding in Microsoft 365 | Full Tutorial
In a previous post, I showed you how to automate user onboarding via a Microsoft Form and Power Automate flow.…
What’s New in Microsoft 365 | September Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Automate User Onboarding with HaloPSA and Microsoft 365 | Full Tutorial
In last weeks post, I showed you how to use Microsoft Forms and Power Automate to automate employee onboardings across…
Automate Employee Onboarding in Microsoft 365 | Full Tutorial
Employee onboarding can be both time consuming and prone for human error across our technicians. In this article, I am…