30Sep2024
29Aug2024
When Should I Upgrade my Microsoft 365 Subscription?
I get some form of this question pretty often. It’s been on my backburner for ages to write an article that covers this topic, so that I can more easily point people to it. The question usually goes something like this: I currently have X subscription. Is this good enough?...
13Jul2024
Global Secure Access for the SMB, Part 2: Private Access
I have previously written about Microsoft’s Global Secure Access for the SMB. This is actually two products under a single banner: Microsoft Entra Internet Access Microsoft Entra Private Access In my first article, I focused on Microsoft Entra Internet Access, since this is where the majority of Small...
29Jun2024
Should I allow personal laptops or stick with company owned?
Today's post is based on a reader question. Hey Alex, I am trying to figure out how to talk to my client about personal vs. work-owned laptops. Right now, they have a mix of both. I am a bit confused because Microsoft makes it seem like they have the tools to secure...
31May2024
Updated Intune Scripts and a Security Profile for the SMB
Some years ago, Microsoft published a repo on GitHub describing how to use PowerShell to interact with the Microsoft Graph and create/manipulate objects within Intune. This was soon followed by another project, where they published three "Security profiles" as pictured below: Image credit: Microsoft Most of the configurations required...
16Apr2024
Global Secure Access: Is it for the SMB?
A couple of months ago, I presented a session on Microsoft Entra's Global Secure Access (GSA), which is really two products under a single unifying banner. Image credit: Microsoft Almost nobody in the audience had heard of Global Secure Access before. Granted, it was (and still is) fairly new, but I was...
29Feb2024
My Favorite Multi-tenant Tools for Microsoft 365 Cloud
Today I want to address something that Managed Services Providers in particular struggle with daily. And that is managing dozens if not hundreds of Microsoft tenants, each of which represents a unique security boundary, with its own set of users, devices, licenses, security configurations, and so on. This problem is...
04Jan2024