top of page


Conditional Access Essentials: RMAUs, Named Locations, Authentication Strengths, Service Principals
Strengthen your Conditional Access strategy with practical essentials. Explore how RMAUs, Named Locations, Authentication Strengths, and Service Principals protect sensitive accounts, secure apps, and enforce the right access for every persona. Real-world guidance for building resilient, manageable policies.
Aug 2615 min read
Â
Â
Â


Conditional Access Essentials: Naming conventions, personas, emergency access & design process
Master Conditional Access with a Zero Trust, persona-based approach. Learn how to structure policies, avoid security gaps, and keep everything organised with clear naming conventions. From discovery workshops to practical use cases, this guide helps you design scalable, secure policies that work in the real world.
Aug 199 min read
Â
Â
Â


Configuring M365 Company Branding & Privacy Settings: Simple Tricks to Reduce Phishing Risks
Company branding isn’t just about creating a visual identity - it’s a key security measure for reducing phishing risks. In this post, I dive into how configuring your Microsoft 365 login page with your company’s logo, colours, and even a recognisable background image can help users easily spot fake login pages. Spoiler: there are ducks involved, and you’ll have to read on to understand why!
Jul 86 min read
Â
Â
Â
bottom of page





