Microsoft 365, made simple
Audit. Harden. Automate. Intune and Exchange configured to best practices, with security you can measure.
Last articles…
Featured
Intune App Packaging Decision Guide: Win32, LOB, MSIX, Store, and When to Use Each
Most Intune projects fail quietly after deployment — not because the configuration is wrong, but because nobody builds an operational rhythm to keep it healthy. This final part fixes that.
Featured
Transport rules have been in Exchange since the on-prem days. Microsoft keeps adding newer policy engines, but mail flow rules remain the workhorse for anything those engines do not cover. This article covers the baseline rules most tenants need, external sender tagging (custom vs native), disclaimers, security-focused patterns, encryption triggers, the AND/OR condition logic trap, rule priority and stop processing, where transport rules overlap with Purview DLP and Defender, PowerShell management patterns, limits and constraints, and a 14-point audit checklist.SPF, DKIM, DMARC, MTA-STS and TLS-RPT done properly for Exchange Online — the order of operations, the Exchange Online-specific gotchas, and how to get to DMARC p=reject without breaking mail flow.
Featured
Zero Trust is everywhere — in vendor pitches, compliance checklists, and security strategies. But most organisations treat it as a product to buy rather than a model to implement. This article cuts through the marketing: what Zero Trust actually is (and is not), the six technology pillars mapped to your Microsoft 365 stack, why Conditional Access is the policy engine that connects everything, why MFA alone does not equal Zero Trust, and what the 2026 "All resources" enforcement change means for your tenant. Includes a visual mental model and a practical framework for getting started.
Build a Privileged Access Workstation for Microsoft 365 with Intune, Conditional Access, PIM, WDAC, and Windows LAPS. Practical PAW guide for SMB and mid-market tenants.