Blog

Making sense of the many DLP options in Microsoft 365

Making sense of the many DLP options for Microsoft 365

One of my readers wrote to me recently about an article that I penned a couple of years ago, on the topic of Data Loss Prevention in Microsoft 365. They pointed out that my breakdown was a bit dated now, and that the Microsoft universe seems to have become more...
Read more...
A Sneak Peek at App Management for Edge

A Sneak Peek at Application Management for Edge

This blog has been active for at least six years. To this day, I probably receive more questions about BYOD and the various options we have for management with regard to personal devices, than any other topic that I have written about. I think this just goes to show the...
Read more...
The Importance of Clear Communication

The Importance of Clear Communication

I regularly advocate for aggressive change in small-sized organizations. In many ways, this is one place where smaller sized businesses have an advantage over mega-corporations. The larger the company, generally the longer it takes for them to adopt (and adapt to) new technology. There are exceptions to every rule of...
Read more...
Unboxing Microsoft Defender for Business: Device-based Conditional Access

Unboxing Microsoft Defender for Business, Part 4: Integration with MEM and Conditional Access

Welcome back to this series! Microsoft Defender for Business (MDB) is a huge product with lots of ground to cover. So far we have discussed the Simplified configuration process, Threat & Vulnerability Management, and Attack Surface Reduction Rules. Since we began our series an exciting thing has happened: MDB has been...
Read more...
Why Not Set Up a Retention Policy Today?

Why Don’t You Have a Retention Policy In Place Yet?

Most SMBs I consult with have never configured a retention policy, or indeed, they are not even aware of the retention capabilities in Microsoft 365. In general, Information Governance is one of those areas that simply does not get the attention that it deserves, especially in the small business market. But...
Read more...
Unboxing MDB, part 3: ASR rules

Unboxing Defender for Business, Part 3: Attack Surface Reduction rules

If you haven't been following this series, let me catch you up. First, understand that Microsoft recently made a huge announcement: their enterprise-class endpoint security solution, known as Microsoft Defender for Endpoint, has been re-packaged and released for the SMB (and included in the popular Microsoft 365 Business Premium SKU)...
Read more...
Unboxing Defender for Business, Part 2: Threat & Vulnerability Management

Unboxing Defender for Business, Part 2: Threat & Vulnerability Management

Last time we looked at how to get started with Microsoft Defender for Business and the so-called "Simplified configuration process," which helped us onboard our first Windows devices and apply basic policies to manage antivirus and firewall settings across the organization. In this blog post, we will ask the question:...
Read more...

ITProMentor gets a new virtual home and membership platform

Outsourcing done right This weekend an exciting thing happened here at ITProMentor.com: we moved to a brand new website with a fancy new design. I encourage my fans and long-time readers to check out the new digs. I can't really take all the credit though. I knew it was time to...
Read more...
Happy Holidays, and looking forward to 2022

Happy Holidays, and looking forward to 2022

The end of another year is fast approaching. And that means (besides that the holidays are coming) it’s time for my annual review process. As a self-employed person who identifies as a rebel (meaning that I don’t take direction from myself or others very well), this is something that I have...
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.