ZeroToTrust | Practical Microsoft Security, Intune, and Entra Guidance
Practical Microsoft Security guidance for Intune, Entra ID, Defender XDR, Purview, Global Secure Access, and real-world Zero Trust deployments.
-

Don’t Burn the Steak: Entra Passkeys, Shared PCs, and Phishing-Resistant Access
Microsoft Entra passkeys on Shared Windows PCs before serving phishing-resistant access to production.
-

Your Data Has a Back Door. GSA and Purview Are the Deadbolt
GSA and Purview team up to block data leaks
-

Stay Tunedin: Why I Built My Own Intune Assignment Dashboard
6,000 groups, zero visibility. So I built a fix.
-

Happy Little Edge. Securing Windows BYOD with Edge for Business
Secure Windows BYOD access with Edge for Business.
-

Windows 365 Cloud Apps. Give them the biscuit, not the kitchen
My wife and I recently took a trip to Savannah, Georgia, and let me tell you, that city knows how to do food. We stumbled into this little restaurant, and they brought out a basket of biscuits that genuinely changed me as a person. Flaky, buttery, golden on the outside, soft on the inside. I’m
-

Prompt Injection is the New Phishing…. Here’s how GSA Can Help
If your org is starting to rely on tools like ChatGPT, Copilot, Claude, or Gemini, you are probably already thinking about data leakage. However, there is another problem that shows up fast. People can “talk” an AI tool into doing something it was never meant to do. That is prompt injection in a nutshell. It
-

Kiosk Chaos to Calm. Building Multi-App Assigned Access with Intune
Lock down kiosks. Troubleshoot blocks fast.
-

AI Agents Are Swarming Your Tenant. How Conditional Access for Agent ID Keeps Them in Check
Taming AI agents with Entra Conditional Access guardrails
-

Global Secure Access and Sentinel Integration…. and brisket?
Connect GSA to Sentinel: see more, guess less.
-

Guardrails for the Internet Lane: Rolling Out GSA Threat Intelligence
Block risky clicks: enable Entra GSA Threat Intelligence.
-

Come Fly the Friendly Skies – Edge Password Protection
Edge password protection setup
-

Finally! Private Access for Domain Controllers is Here
Lock down Domain Controllers with Conditional Access magic.
-

Flipping Intune Switches – The Secret Sauce to Smarter Endpoint Security
Simplify device compliance with MDE.
-

Deny, Deny, Deny! A Look at EPM’s Newest Superpower
Intune EPM deny rules
-

Your Files Called… They want Personal Data Encryption
Setting up Personal Data Encryption.
-

Block Party: Taking Down Risky Apps with Zero Effort
Automated unsanctioning with targeted exceptions, keeping Shadow IT controlled.
-

Bringing Defender for Cloud Apps + Defender for Endpoint Together
Integrate MDCA and MDE to automatically block risky cloud apps.
-

Intune Delivery Optimization & Connected Cache – Part 2
Delivery Optimization slashes bandwidth and eases troubleshooting.
-

Boost Your Bandwidth: A Friendly Guide to Delivery Optimization and Connected Cache
Optimize updates with Delivery Optimization and Connected Cache in Intune.
-

Tired of Proxy Problems? Meet Edge for Business Protection
Edge + Defender = Faster, smarter cloud app session protection.
-

Intune Primary User Mix Up
Script fixes primary‑user chaos in Intune
-

Need-to-Know Entra Device Group Info? This Script Has Your Back
Identify device users fast with this Intune-friendly PowerShell script.
-

Saving the World from AI Action Figure Mayhem (With a Little Help from Entra Internet Access)
Web filtering made fun and simple.
-

Save the Meatloaf! Why Protected Actions Matter in Entra
Protected Actions save more than meatloaf.
No posts on this page match that filter. Try Latest, or browse the full archive.

