Monthly Archives - May 2019

How-to setup Intune quickly (and strategically) in your environment

UPDATE: I have updated the setup script to now be a single script, with the JSON files embedded within it. You do not need to download the JSON files separately, however they are provided for reference. UPDATE: I also have a best practices guide for securing Windows 10 Business edition using...
Read more...

New Baseline Conditional Access Policies in Azure AD

Remember over a year ago when the first Baseline Conditional Access policy dropped? It was simple enough and most definitely a good move, but of course, most people still aren't using it. I have heard some nightmarish statistic--something like less than 2 percent of admin accounts in Azure AD are...
Read more...

Introducing the Microsoft Office 365 Email Security Checklist

Okay. I think I have had enough. Enough of what? Enough of reports like this one. And since email is still the number one attack vector in use by the bad guys, it's time we step up our game--I'm looking at you, IT pros (especially consultants). Of note, from the...
Read more...

Three ways to disable basic authentication and legacy protocols in Exchange Online

One of the most common (and often successful) attacks we see in the wild is a simple brute force / password spray against weak accounts. Especially against shared mailboxes. From that foothold, the most common next step attackers will take is to send out spam/phishing emails from the compromised account,...
Read more...

How to deal with departed user data in Microsoft Office 365

Going from one organization to the next, I am always amazed at how different people implement their own take on new user setups or decommissioning departed users. Some have no real organized methodology and it's a hassle every time, while others have a well-developed practice or script around each process. It...
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.