top of page

Security Blog
Search


Conditional Access Policy Naming Conventions - Do you need them?
It's not unusual for a some environments to have complex policies that grow over a period of time, however the negative impact of these...
May 113 min read
565 views


Deploying Microsoft Conditional Access Policies using the 365 Admin Console
Welcome to the first part in a series on Conditional Access Policies where I'll go over the various options available to you. Ranging...
May 74 min read
846 views


Securing your new Azure Tenant
So you've set up your new Microsoft Azure Tenant, onboarded users and got the fundamentals working that you needed, but what about the...
Apr 214 min read
1,628 views


MS Defender for Servers - Product Features
This is the first blog in a short series where I'm sharing excerpts from my eBook Demystifying Microsoft Defender for Servers, available...
Mar 93 min read
127 views


The Benefits of moving to a Microsoft 365 Business Premium licence
It’s not unusual for small or medium sized businesses to want to minimise software costs and purchase the bear minimum where possible. In...
Sep 12, 20243 min read
114 views


The Value of Hiring a Security Consultant
Question: Do you really care about Cyber Security within your business, or is it seen as more of a hinderance / compliance requirement?...
Sep 9, 20245 min read
54 views


Configuring Microsoft Defender for External Attack Surface Management (EASM)
Well let's start off first with what exactly is Microsoft Defender EASM? In a nutshell, it's a capability within the Azure Portal that...
Sep 6, 20242 min read
377 views


Reducing Risks for Small / Medium Sized Companies
Quite rightly, the Microsoft Cloud platform is purchased by individuals and companies for specific tasks, such as communication,...
Aug 28, 20243 min read
69 views


Restricting FIDO2 Passkey Use to Specific Hardware Models in Microsoft Entra
If you didn't know, Microsoft offers the option to define the type of FIDO2 Passkey device that can be used for registration in your...
Aug 26, 20241 min read
17 views


So you're thinking of moving to MS Sentinel but don't know where to start
The mere thought of moving to a dedicated SIEM solution can feel daunting for many businesses at the best of times, and let's be honest...
Aug 14, 20242 min read
73 views


The Race to going Passwordless
In the ongoing battle against malicious attacks, security vendors are having to come up with stronger solutions to secure our online...
Aug 5, 20242 min read
36 views


Are Modern Security Controls overkill or not enough?
Security breaches have almost become the norm in the media these days, where millions upon millions of company records are either lost or...
Jul 23, 20244 min read
13 views


Defender for Servers - Staging your updates (be careful!)
Deploying So you're considering deploying Microsoft Defender to your server estate, but you're concerned about controlling how often they...
Jul 22, 20244 min read
33 views


Buying the latest Next-Gen Security Product isn't a silver bullet solution
The IT industry has a constant stream of sales waffle and acronyms for the latest and greatest technology. Whether it's Next-gen...
Aug 19, 20232 min read
84 views


Configuring Azure PIM with Security Groups
So firstly what is Azure PIM? Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to...
Aug 6, 20234 min read
1,133 views


MS Defender for Endpoint Policy Tips #01 - Beware of this policy!
So you're rolling out Defender for Endpoint and you're really getting stuck in to the more complex policies under the hood with the...
Jul 15, 20234 min read
564 views


Defender for Identity Reporting
Microsoft have finally added improved reporting to the Defender for Identity capabilities, with the implementation of four new reports....
Jul 8, 20231 min read
53 views


Identity PowerToys
Created by Merill Fernando, IdPowerToys provides a slick method to see all of your existing Conditional Access Policies in an easy to...
Jul 8, 20232 min read
754 views


Configuration Analyser for Microsoft 365
Do you use Microsoft 365 for email, but aren't sure how to get the basic security controls sorted? Microsoft have you covered now with...
May 15, 20231 min read
102 views


Conditional Access Policies - Token Protection (currently in preview)
Token protection helps to reduce an attack surface through binding a token to the device and preventing against "replay attacks" where a...
Apr 2, 20232 min read
101 views


Implementing FIDO2 Security Keys support for Azure Privileged Accounts
Ever heard of Yubikeys by Yubico? Well I'm a bit of a fan myself and have used them for a variety of online accounts for many years now....
Apr 1, 20233 min read
112 views


How to install the new Microsoft Teams Client
Microsoft have just released a brand new Teams client in public preview with a multitude of enhancements ranging from; - Improved...
Mar 28, 20231 min read
47 views


Azure Conditional Access Policies - Force MFA for Admin Roles
If you don't have multi-factor authentication configured for your Administrator accounts, then you're leaving your Azure environment more...
Feb 19, 20231 min read
84 views


Azure Conditional Access Policies - Prevent logging on from specific countries
Disclaimer: CA Policies can cause significant impact to business if configured incorrectly, so please ensure you takes measures to...
Feb 4, 20232 min read
105 views
bottom of page