This blog will be about me experimenting with Conditional Access and with experimenting, I mean […]
Web Content filtering: The final chapter
Starting with Microsoft 365 business is an excellent idea. It contains almost everything you need […]
The Blind Event Log
This blog will be about why sometimes the Windows Microsoft Defender event log, does not […]
Autopilot: The Group Membership War
This blog will be about my experience using a dynamic group for the Windows Autopilot […]
Remote Wipe: The Next level
This blog will show you how you can wipe all devices even when you don’t […]
Birds of Printer Nightmares
When I started this blog, it was all about showing you the options you have […]
How to Force Sync Microsoft Edge Settings Using Custom ADMX in Intune
Managing browser settings across an organization is a critical aspect of IT management, especially when […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples […]
The Applocker Dilemma
This blog will discuss how a “NotConfigured“ AppLocker policy can come back to haunt you. […]
A million ways to implement ISO 27001 controls.
After being inspired by Alexander Fields about the CIS framework and Microsoft 365, I took […]