Managing browser settings across an organization is a critical aspect of IT management, especially when […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples […]
The Applocker Dilemma
This blog will discuss how a “NotConfigured“ AppLocker policy can come back to haunt you. […]
A million ways to implement ISO 27001 controls.
After being inspired by Alexander Fields about the CIS framework and Microsoft 365, I took […]
The Curious Case of the Vanishing Alias: A Dive into Microsoft Entra Connect and Email Aliases
Sometimes, a seemingly straightforward task becomes an unexpected troubleshooting adventure. In today’s story, we’re diving […]
Continuous Access Evaluation: Rise of the Claim challenge
Hi, Refresh tokens, Hi lag when Terminating users or setting a new password. Welcome continuous […]
MCAS: Judgement Day
This blog will be about how I broke my own Microsoft Cloud App Security instance. […]
The Man Who Shot Office Hardware Acceleration
This simple blog will explain why Outlook can be seriously lagging while typing. And I […]
Guardians of the Local Admin rights
Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m […]
The never-ending Command Prompt
This blog will be about some new ADMX-backed policies for MDM to block access to […]