This blog will be about some issues we ran into when we deployed Conditional Access to make sure only devices that are located in trusted countries could access the company’s […]
Conditional Access, the Good, the Bad, and the Ugly
What do I mean by this? Conditional Access is an extremely powerful tool within the Microsoft 365 environment. Even when you implement just the basics, it provides your tenant with a security […]
The Return of the Giphy
It’s time for a “funny” blog. Giphy… I never realized there’s a difference between posting GIFs in Whatsapp or Teams. Within Teams there are 2 options to allow or block […]
Secure your data like it was Fort Knox
One thing is certain, you need to protect your (important) data at all costs. Otherwise, it could come back to haunt you. Luckily there are multiple options to protect your […]
Conditional Access “To Go”
This blog will be about automating your Conditional Access Rules with Powershell and some troubleshooting withe the new-AzureADMSCAPolicy command Last week I published an overview of the best Conditional Access […]
Where the Wild Applocker Rules Are
This blog will guide you through the manual configuration of AppLocker and demonstrate how to import the XML into a custom configuration profile in Intune using CSP (Configuration Service Provider). Why a CSP? We still don’t have a settings catalog to use!
Me and Earl and the Microsoft Store Apps
This blog will show you what option you have to Block / Prevent / Restrict access to the Microsoft Store
Block Access to Administrative Apps like the Command Prompt In Intune.
This blog will be about how to block access to the CMD, PowerShell, and registry tools within a few seconds! 1. Why you want to block PowerShell There are many […]
Why only an Exchange Online license’s does not cut it.
Everyone is currently using Microsoft Office 365 Exchange Online. With the Corona Virus, surely Microsoft Teams has been added. We just assume that Microsoft has its security in place. But only an […]
Why only MFA doesn’t “pay the bills”?
Many people tell you MFA is very important, and of course, they are right to tell you so… About 99.9% of compromised accounts aren’t equipped with MFA. Once logged in, the “attacker” gets full access to the mailbox, and they will start […]