This blog will be about me experimenting with Conditional Access and with experimenting, I mean […]
Remote Wipe: The Next level
This blog will show you how you can wipe all devices even when you don’t […]
Birds of Printer Nightmares
When I started this blog, it was all about showing you the options you have […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I […]
The Fellowship Of Group Labelling
Labelling your data with sensitivity labels is the way to go. Confidential data within your […]
Basic Authentication and the Last Crusade
In this blog I’ll show you a new option to disable basic authentication protocols. As […]
Sherlock Holmes: A Game of Powershell
My second blog in just one day, but sometimes you get scared as hell! Today […]
Along came MCAS/MDCA Automation
This blog will show you, how you could import your Microsoft Cloud App security/ Microsoft […]
The Magnificent ASR Rules
This blog is the third part of the Endpoint Security Series. It will be about […]