This blog will be about some MFA, some Conditional Access, and some activity in the […]
PAW: Love and Thunder
I guess after all the blogs I have written about Endpoint Security, I need to […]
Device Health Attestation: Age of Compliance
Some time ago I wrote a blog about conditional access, the PRT, the “DeviceID” and […]
The Death of Compliance
This blog will show you how Device-Based Conditional Access works and how it determines if […]
Conditional Access: The Day of the Joining Device
This blog will be about a new User action in conditional Access and how to […]
Gmail: King of the Monsters
Different week, different use cases. This blog will be about the impossibility of having GMAIL […]
Zero Trust Security Flow
Everything is about Zero trust security; you will need to implement it. Many articles have […]
The book of Non-Managed Shared Devices
This blog will be about what options you have when you got a lot of […]
The Conditional Access Experiment
This blog will be about me experimenting with Conditional Access and with experimenting, I mean […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples […]