30Sep2024
29Feb2024
My Favorite Multi-tenant Tools for Microsoft 365 Cloud
Today I want to address something that Managed Services Providers in particular struggle with daily. And that is managing dozens if not hundreds of Microsoft tenants, each of which represents a unique security boundary, with its own set of users, devices, licenses, security configurations, and so on. This problem is...
24Nov2023
Happy Holidays, and a New Course
Hey everyone, I just wanted to send out a quick note about the new course on CIS Controls, and to extend a Holiday discount on all of the ITProMentor.com courses in honor of the whole Black Friday/Cyber Monday thing. So, let's get that out of the way first: Now through the...
31Jan2023
A friendly reminder about least privilege access and other simple stuff
I just spent an exhausting 36 or so hours helping a customer out of a really bad situation. Well, technically they aren't out of the woods yet, but things are clearing up anyway. And I am at the point now where I exit, handing off the bulk of remaining tasks...
19Aug2022
Reader Question: How can I set up a “Deny-by-Default” Conditional Access Policy?
It has been a while since I took a question from a reader and turned it into a blog post. It is one of my favorite things to do here on ITProMentor, but the “busy-ness” of life has taken me away from the keyboard a lot in recent months. Now...
16Jun2022
Selling the Digital Transformation Journey: Security & Compliance
When I talk to customers about their Digital Transformation Journey, I always like to give them the "10,000 foot view" so to speak. I suggest that we explore two different angles or "big pictures" in order to paint an image that customers can then imagine themselves into....
09Mar2022
Unboxing Microsoft Defender for Business, Part 4: Integration with MEM and Conditional Access
Welcome back to this series! Microsoft Defender for Business (MDB) is a huge product with lots of ground to cover. So far we have discussed the Simplified configuration process, Threat & Vulnerability Management, and Attack Surface Reduction Rules. Since we began our...
01Feb2022
Unboxing Defender for Business, Part 2: Threat & Vulnerability Management
Last time we looked at how to get started with Microsoft Defender for Business and the so-called "Simplified configuration process," which helped us onboard our first Windows devices and apply basic policies to manage antivirus and firewall settings across the organization. In this blog post, we will ask the...
30Jul2021
The three opportunities for MSP’s moving forward
The writing has been on the wall a while now; with a mass exodus to cloud services such as Microsoft 365 from traditional on-premises infrastructure, it was only a matter of time before those selling MSP services had to either evolve or die off. And with
09Jul2021