top of page


Conditional Access Essentials: Introduction, use cases, the art of possible
Discover how Microsoft Conditional Access protects your Microsoft 365, Entra, and Azure environments. Learn the essentials, explore real-world use cases, and see the art of the possible with practical examples. From securing identities to controlling device access, this guide is your starting point for mastering Conditional Access in a modern Zero Trust security strategy.
Aug 124 min read
Â
Â
Â


Legacy MFA & SSPR are retiring -How to migrate MFA and SSPR settings to the Authentication methods policy
Learn how to migrate MFA and SSPR policy settings to the Authentication methods policy in Microsoft Entra before the legacy settings are retired. This guide walks IT pros through the step-by-step process, gotchas to avoid, and key recommendations to ensure a smooth and secure transition to modern authentication methods.
Jul 296 min read
Â
Â
Â


Configuring M365 Company Branding & Privacy Settings: Simple Tricks to Reduce Phishing Risks
Company branding isn’t just about creating a visual identity - it’s a key security measure for reducing phishing risks. In this post, I dive into how configuring your Microsoft 365 login page with your company’s logo, colours, and even a recognisable background image can help users easily spot fake login pages. Spoiler: there are ducks involved, and you’ll have to read on to understand why!
Jul 86 min read
Â
Â
Â


Data Strategy Breakdown Series - Entra ID (5)
In this final installment of the Data Strategy Breakdown series, we dive into Entra ID and why securing your identity is crucial for a strong data strategy. With a focus on practical, real-world recommendations, we cover 20 vital tips for protecting your environment, from privileged identity management to securing device join processes. While Conditional Access will be explored in future posts, this piece provides a comprehensive foundation for managing permissions, protectin
Jul 26 min read
Â
Â
Â


Dealing with sign-in error code 500121: Authentication failed during strong authentication request
Introduction I’ve been meaning to write about this for quite some time, but for some reason, it kept slipping my mind. Last year, a...
Jan 54 min read
Â
Â
Â


Beyond Passwords: The Passwordless Authentication Series - part 3
Disclaimer This blog is my personal platform. The opinions shared here are solely mine and do not reflect the views of any individuals,...
Aug 29, 20247 min read
Â
Â
Â
bottom of page