Monthly Archives - May 2019

How-to setup Intune quickly (and strategically) in your environment

Update May 2024: This is now obsolete information, instead see this post: Updated Intune Scripts and a Security Profile for the SMB - ITProMentor Update March 2023: Much of what is written here eventually became the basis for my SMB Guide to Threat Defense and Microsoft Defender. Which in...
Read more...

Introducing the Microsoft Office 365 Email Security Checklist

Update March 2023: This project morphed into the Microsoft 365 Best Practices Checklists, which includes a checklist and guide for each of the major services in Microsoft 365. You can get the product here. Okay. I think I have had enough. Enough of what? Enough of reports like this...
Read more...

Three ways to disable basic authentication and legacy protocols in Exchange Online

One of the most common (and often successful) attacks we see in the wild is a simple brute force / password spray against weak accounts. Especially against shared mailboxes. From that foothold, the most common next step attackers will take is to send out spam/phishing emails from the compromised account,...
Read more...

How to deal with departed user data in Microsoft Office 365

Going from one organization to the next, I am always amazed at how different people implement their own take on new user setups or decommissioning departed users. Some have no real organized methodology and it's a hassle every time, while others have a well-developed practice or script around each process.It...
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.