Technical

Multi-tenant management for Microsoft 365, and other things

Multi-tenant management for Microsoft 365, and other things

IT service providers are constantly looking for more efficiency, and better ways to manage their customers' hardware and software assets. In the Microsoft realm, we finally have Microsoft 365 Lighthouse, which is now in public preview. Some of my MSP customers have raised question marks around its current feature set...
Read more...
Fast and Free Incident Response Tools in Microsoft 365

Fast and Free Incident Response Tools in Microsoft 365

As part of the SquareOne Summer Security Series, our group recently explored the topic of Incident Response in Microsoft 365. This was a very well-received course, and I felt a blog post was in order to cover off on some of the important content from that segment, which I think...
Read more...
Simple Sensitivity Label design for the SMB

Simple Sensitivity Label design for the SMB

In the recent updates to the CIS Controls (v8), one of the most noticeable changes was the re-prioritization of Data Protection (now Control #3, up from #13 previously). This control calls out a number of safeguards: inventory of sensitive data and data classification is among them. Sensitivity labels can help...
Read more...
Updates to the CIS Controls and Free Microsoft 365 Assessment Workbook

Updates to the CIS Controls and Free Microsoft 365 Assessment Workbook

I know my community is already familiar with the CIS Critical Security Controls, as well as the free assessment workbook that I adapted from AuditScripts to apply to Microsoft 365 environments. This week, the Center for Internet Security released updates to the framework (we are now on v8). You can...
Read more...
Choosing (and implementing) your strategy for personal devices

Choosing (and implementing) your strategy for personal devices

In a recent Microsoft blog announcing some cool new discovery features in Microsoft Defender for Endpoint, there is an interesting (but hardly surprising) statistic shared: your users are 71% more likely to be infected on an unmanaged device. Now the thrust of the article is around discovering assets in your environment...
Read more...

The realities and limitations of managing personal (BYOD) devices in Microsoft 365 and Endpoint Manager

These days, I am willing to bet that I get asked about BYOD endpoints over corporate endpoints 10 to 1. Personal devices (even personal Windows devices) are creeping into the workplace more and more, especially with so many working from home. And this does present a few challenges for those...
Read more...

Monitoring identity, cloud apps and email at different service tiers

Today I want to give you two ideas that you can take to your customers as new offerings. Some of you may already be doing some form of this, but based on my recent survey results, identity protection and monitoring in the cloud is still an area that is wanting...
Read more...

How much security is ‘enough’ security? Looking at Microsoft 365 Defender vs. Azure Sentinel

How much security is 'enough' security? This is in fact a trick question, I just threw it in there to get your attention. When it comes to security, one can never be 'safe,' but only 'safer' (even with the most expensive of cybersecurity tools and talented, dedicated humans to back...
Read more...

The “Five Rules of Fields” for File Server Migrations to Microsoft 365

What a fun tongue twister, and such a practical resource that I am excited to share with you today! Well, actually a lot of this information you might have already gleaned by following my past posts about file server migration. But I still find that when I consult with folks...
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.