16Jan
03Sep
Multi-tenant management for Microsoft 365, and other things
IT service providers are constantly looking for more efficiency, and better ways to manage their customers' hardware and software assets. In the Microsoft realm, we finally have Microsoft 365 Lighthouse, which is now in public preview. Some of my MSP customers have raised question marks around its current feature set...
09Jul
Fast and Free Incident Response Tools in Microsoft 365
As part of the SquareOne Summer Security Series, our group recently explored the topic of Incident Response in Microsoft 365. This was a very well-received course, and I felt a blog post was in order to cover off on some of the important content from that segment, which I think...
11Jun
Simple Sensitivity Label design for the SMB
In the recent updates to the CIS Controls (v8), one of the most noticeable changes was the re-prioritization of Data Protection (now Control #3, up from #13 previously). This control calls out a number of safeguards: inventory of sensitive data and data classification is among them. Sensitivity labels can help...
20May
Updates to the CIS Controls and Free Microsoft 365 Assessment Workbook
I know my community is already familiar with the CIS Critical Security Controls, as well as the free assessment workbook that I adapted from AuditScripts to apply to Microsoft 365 environments. This week, the Center for Internet Security released updates to the framework (we are now on v8). You can...
16Apr
Choosing (and implementing) your strategy for personal devices
In a recent Microsoft blog announcing some cool new discovery features in Microsoft Defender for Endpoint, there is an interesting (but hardly surprising) statistic shared: your users are 71% more likely to be infected on an unmanaged device. Now the thrust of the article is around discovering assets in your environment...
09Feb
The realities and limitations of managing personal (BYOD) devices in Microsoft 365 and Endpoint Manager
These days, I am willing to bet that I get asked about BYOD endpoints over corporate endpoints 10 to 1. Personal devices (even personal Windows devices) are creeping into the workplace more and more, especially with so many working from home. And this does present a few challenges for those...
12Jan
Monitoring identity, cloud apps and email at different service tiers
Today I want to give you two ideas that you can take to your customers as new offerings. Some of you may already be doing some form of this, but based on my recent survey results, identity protection and monitoring in the cloud is still an area that is wanting...
16Nov
How much security is ‘enough’ security? Looking at Microsoft 365 Defender vs. Azure Sentinel
How much security is 'enough' security? This is in fact a trick question, I just threw it in there to get your attention. When it comes to security, one can never be 'safe,' but only 'safer' (even with the most expensive of cybersecurity tools and talented, dedicated humans to back...
02Nov