Microsoft Entra Connected Organizations: Getting External Access Under Control
| |

Microsoft Entra Connected Organizations: Getting External Access Under Control

Every IT team knows the struggle: a supplier needs SharePoint access, a consulting firm needs to join a Teams workspace, or a subsidiary wants to log into an internal app. What usually happens? Someone invites an external user as a guest, gives them access, and moves on. Fast forward a year — nobody remembers who…

Securing Entra ID with YubiKey: How to Set Up and Sign In with Your Security Key
|

Securing Entra ID with YubiKey: How to Set Up and Sign In with Your Security Key

Passwords alone are no longer enough. Phishing attacks, password reuse, and credential stuffing continue to plague organizations. Microsoft Entra ID (formerly Azure AD) supports strong phishing-resistant authentication methods, and one of the most practical options is using a FIDO2-compliant security key like YubiKey. In this guide, we’ll walk through how to set up YubiKey with…

Why You Need to Stop Using onmicrosoft.com for Emails in Microsoft 365
|

Why You Need to Stop Using onmicrosoft.com for Emails in Microsoft 365

When you spin up a new Microsoft 365 tenant, Microsoft automatically gives you a default domain — usually something like thatlazyadmin.onmicrosoft.com. These MOERA (Microsoft Online Email Routing Address) domains are incredibly handy at the beginning. They let you test, create users, and send mail right away, even before you’ve bought a proper domain. But here’s…

Secure Your Microsoft 365 Environment: Fixing Unsecure Domain Configurations for Better Protection
| | | | | |

Secure Your Microsoft 365 Environment: Fixing Unsecure Domain Configurations for Better Protection

Understanding Unsecure Domain Configurations in Microsoft 365 As we kick off 2025, it’s timek to revisit an often overlooked but critical aspect of Microsoft 365 security: unsecure domain configurations. In this post, we’ll dive into what these configurations are, the risks they pose, and how you can address them to fortify your environment. Let’s get…

Introducing Working Time Management in Microsoft Intune (Quiet Time): Prioritizing Employee Well-being in Shift-Based Roles
| | | | | |

Introducing Working Time Management in Microsoft Intune (Quiet Time): Prioritizing Employee Well-being in Shift-Based Roles

Introducing Working Time Management in Microsoft Intune (Quiet Time): Prioritizing Employee Well-being in Shift-Based Roles The boundary between personal time and work hours has grown increasingly thin, especially with mobile access to work apps like Microsoft Teams. This is particularly challenging for shift-based employees in healthcare, retail, and logistics. With Microsoft Intune’s new Working Time…

Resolving Unexpected Windows 11 Multi-Session License Key Changes in Azure Virtual Desktop with PowerShell Automation
| | | | | | |

Resolving Unexpected Windows 11 Multi-Session License Key Changes in Azure Virtual Desktop with PowerShell Automation

Resolving Unexpected Windows 11 Multi-Session License Key Changes in Azure Virtual Desktop with PowerShell Automation I recently encountered a unique issue within my Azure Virtual Desktop (AVD) environment running Windows 11 Enterprise Multi-Session. This problem specifically arose in the EASTUS region, where the product key on some session hosts unexpectedly changed from Windows 11 Enterprise…

Streamline Your Workflow with Windows 365 Boot: Direct Cloud PC Access on Startup
| | | |

Streamline Your Workflow with Windows 365 Boot: Direct Cloud PC Access on Startup

Streamline Your Workflow with Windows 365 Boot: Direct Cloud PC Access on Startup Imagine starting your day by powering on your device and immediately being logged into your Cloud PC. No more lengthy logins or waiting for everything to sync. Windows 365 Boot makes this a reality by allowing users to skip the local machine…

Breaking Free from VPNs: How Entra Private Access is Revolutionizing Secure Remote Work
| | | |

Breaking Free from VPNs: How Entra Private Access is Revolutionizing Secure Remote Work

Breaking Free from VPNs: How Entra Private Access is Revolutionizing Secure Remote Work “Never trust, always verify.” Let’s face it: remote work isn’t going anywhere. What started as a temporary solution has become the new normal for businesses around the world. But here’s the catch—while we’ve all adjusted to working from coffee shops, home offices,…

How to Enable and Manage File Integrity Monitoring (FIM) in Microsoft Cloud Environments
| | | |

How to Enable and Manage File Integrity Monitoring (FIM) in Microsoft Cloud Environments

Unlocking the Power of File Integrity Monitoring (FIM) with Microsoft Defender for Cloud and Microsoft Defender for Endpoint As part of Microsoft’s continuous efforts to enhance cloud security, the integration of File Integrity Monitoring (FIM) with Microsoft Defender for Endpoint (MDE) has entered public preview under Defender for Servers Plan 2. This September 2024 release…

How to Secure Domain Controllers with Microsoft Defender for Endpoint

How to Secure Domain Controllers with Microsoft Defender for Endpoint

Unlock Enhanced Protection for Domain Controllers with Microsoft Defender for Endpoint Microsoft Defender for Endpoint (MDE) has introduced an exciting new feature that allows organizations to enable security settings management for domain controllers, offering unprecedented control over these critical assets. This capability, currently in preview, provides a streamlined approach to securing domain controllers and helps…

Microsoft 365 Lighthouse vision and upcoming features

Strengthening Security Across Managed Customers with Microsoft 365 Lighthouse

Strengthening Security Across Managed Customers with Microsoft 365 Lighthouse As managed service providers (MSPs) and managed security service providers (MSSPs) continue to grow their portfolios, managing multiple customers across diverse environments can become complex and time-consuming. One of the most critical elements in this management landscape is ensuring that security baselines are consistently applied, monitored,…

How to Create a New Host Pool in Nerdio Manager for Azure Virtual Desktop
| | | | | | | | |

How to Create a New Host Pool in Nerdio Manager for Azure Virtual Desktop

How to Create a New Host Pool in Nerdio Manager for Azure Virtual Desktop Creating a new host pool is one of the essential steps in setting up your Azure Virtual Desktop (AVD) environment using Nerdio Manager. After creating your desktop images, you can easily configure and deploy host pools. Host pools are collections of…