After being inspired by Alexander Fields about the CIS framework and Microsoft 365, I took a deep dive into mapping ISO 27001 to a zero-trust modern workplace. I’ll try to […]
The Curious Case of the Vanishing Alias: A Dive into Microsoft Entra Connect and Email Aliases
Sometimes, a seemingly straightforward task becomes an unexpected troubleshooting adventure. In today’s story, we’re diving into a peculiar issue with email aliases and how Microsoft Entra Connect (previously known as […]
Continuous Access Evaluation: Rise of the Claim challenge
Hi, Refresh tokens, Hi lag when Terminating users or setting a new password. Welcome continuous access evaluation (CAE), bye lag (1-hour refresh token) Continuous Access Evaluation is implemented by enabling […]
MCAS: Judgement Day
This blog will be about how I broke my own Microsoft Cloud App Security instance. Cloud App Security is a fantastic product, it can help you discovering and protecting all […]
The Man Who Shot Office Hardware Acceleration
This simple blog will explain why Outlook can be seriously lagging while typing. And I mean seriously lagging. Some letters will pop up 10/15 seconds after typing. The probability that […]
Guardians of the Local Admin rights
Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m joking, no it’s not! I must be saying this a lot lately. You need to […]
The never-ending Command Prompt
This blog will be about some new ADMX-backed policies for MDM to block access to the Command Prompt (DisableCMD). After trying them out, I encountered some weird behavior. 1. Introduction […]
Lost in Monitoring Onedrive
In this blog, I will explain why it’s important to monitor OneDrive and show you how to set up OneDrive monitoring on your endpoints. When you enable KFM (OneDrive Known […]
Locking Down Guest Users: Why It’s a Must for Your Entra ID Tenant
In this blog, we’ll explore why it’s absolutely critical to lock down guest user access in your Entra ID tenant. Without proper restrictions, guest users could potentially access sensitive information, […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I will show you, how to start deploying Microsoft Defender Application Guard for Office apps. Also, […]