Yearly Archives - 2022

Alternatives to SharePoint and OneDrive

Alternatives to OneDrive and SharePoint (and when to consider them)

One of the things I often get asked about is how to deal with various limitations in OneDrive and SharePoint Online. For those who don’t know, SharePoint Online is the file storage & sharing solution underpinning the Microsoft 365 universe of applications, including the popular Teams application, while OneDrive for...
Read more...
Reader question: Deny-by-Default?

Reader Question: How can I set up a “Deny-by-Default” Conditional Access Policy?

It has been a while since I took a question from a reader and turned it into a blog post. It is one of my favorite things to do here on ITProMentor, but the “busy-ness” of life has taken me away from the keyboard a lot in recent months. Now...
Read more...
Selling the Security & Compliance Journey

Selling the Digital Transformation Journey: Security & Compliance

When I talk to customers about their Digital Transformation Journey, I always like to give them the "10,000 foot view" so to speak. I suggest that we explore two different angles or "big pictures"  in order to paint an image that customers can then imagine themselves into. The first picture...
Read more...
Limitations with MDB Standalone

What are the limitations with Microsoft Defender for Business Standalone?

Most of my readers will already be familiar with Microsoft Defender for Business (MDB), which is included with Microsoft 365 Business Premium. And a majority of those will be deploying MDB as one part of a broader security solution which includes other services within the Business Premium bundle. But a...
Read more...
Making sense of the many DLP options in Microsoft 365

Making sense of the many DLP options for Microsoft 365

One of my readers wrote to me recently about an article that I penned a couple of years ago, on the topic of Data Loss Prevention in Microsoft 365. They pointed out that my breakdown was a bit dated now, and that the Microsoft universe seems to have become more...
Read more...
A Sneak Peek at App Management for Edge

A Sneak Peek at Application Management for Edge

This blog has been active for at least six years. To this day, I probably receive more questions about BYOD and the various options we have for management with regard to personal devices, than any other topic that I have written about. I think this just goes to show the...
Read more...
The Importance of Clear Communication

The Importance of Clear Communication

I regularly advocate for aggressive change in small-sized organizations. In many ways, this is one place where smaller sized businesses have an advantage over mega-corporations. The larger the company, generally the longer it takes for them to adopt (and adapt to) new technology. There are exceptions to every rule of...
Read more...
Unboxing Microsoft Defender for Business: Device-based Conditional Access

Unboxing Microsoft Defender for Business, Part 4: Integration with MEM and Conditional Access

Welcome back to this series! Microsoft Defender for Business (MDB) is a huge product with lots of ground to cover. So far we have discussed the Simplified configuration process, Threat & Vulnerability Management, and Attack Surface Reduction Rules. Since we began our series an exciting thing has happened: MDB has been...
Read more...
Why Not Set Up a Retention Policy Today?

Why Don’t You Have a Retention Policy In Place Yet?

Most SMBs I consult with have never configured a retention policy, or indeed, they are not even aware of the retention capabilities in Microsoft 365. In general, Information Governance is one of those areas that simply does not get the attention that it deserves, especially in the small business market. But...
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.