Microsoft 365, made simple
Audit. Harden. Automate. Intune and Exchange configured to best practices, with security you can measure.
Last articles…
Featured
Intune App Packaging Decision Guide: Win32, LOB, MSIX, Store, and When to Use Each
Most Intune projects fail quietly after deployment — not because the configuration is wrong, but because nobody builds an operational rhythm to keep it healthy. This final part fixes that.
Featured
Transport rules have been in Exchange since the on-prem days. Microsoft keeps adding newer policy engines, but mail flow rules remain the workhorse for anything those engines do not cover. This article covers the baseline rules most tenants need, external sender tagging (custom vs native), disclaimers, security-focused patterns, encryption triggers, the AND/OR condition logic trap, rule priority and stop processing, where transport rules overlap with Purview DLP and Defender, PowerShell management patterns, limits and constraints, and a 14-point audit checklist.SPF, DKIM, DMARC, MTA-STS and TLS-RPT done properly for Exchange Online — the order of operations, the Exchange Online-specific gotchas, and how to get to DMARC p=reject without breaking mail flow.
Featured
Build a Privileged Access Workstation for Microsoft 365 with Intune, Conditional Access, PIM, WDAC, and Windows LAPS. Practical PAW guide for SMB and mid-market tenants.
A new page in Microsoft Defender XDR that brings password-related risk from Active Directory, Entra ID and Okta into one place, leaked credentials, exposed passwords, weak policies and hygiene gaps, all actionable from a single view.