Back Home

All we do is help IT
  • Home
  • Orders
  • Account details
  • Advertise
  • Mastermind Groups, Courses and more
  • 👉 SellMyMSP: All stages M&A 👈
  • Search
Back Home

  • Search
  • Home
  • Orders
  • Account details
  • Advertise
  • Mastermind Groups, Courses and more
  • 👉 SellMyMSP: All stages M&A 👈
man raising his right arm

Disrupting Qakbot

All it took was an email attachment policy, a little hardening of Microsoft Office and the configuration of the built-in anti-virus software

person wearing white pants and white socks standing beside brown broom

How to isolate a device using Defender

let's say that you've come across a situation, and you want to remove a device from the network - remotely, while you investigate. Interestingly this device, need not be enrolled in Defender for Business. It can an unmanaged device to

The Frozen Wild Dnieper River

How to prevent weak MFA session token theft

Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We'll take that analysis and implement a solution based upon it

photo of yellow and blue macaw with one wing open perched on a wooden stick

Blocking malicious activity – too many email updates

I often get asked how we manage networks without an RMM tool and I always reply that we take full advantage and make use of what Microsoft has to offer. This type of rule is an example of that philosophy.

a man in red shirt covering his face

Error setting up Identities in Defender

To resolve this error, you need to remove three security groups from Azure AD. These groups were created by default in your tenant but have since been deprecated by Defender.

How to Defender

This is a collection of posts about Microsoft Defender. How to set, configure, troubleshoot and implement.

rock formation

Prerequisites of settings for Defender

There are a number of basic settings in Defender that should be configured before you start using Defender.

sunflower during sunset

How to use the Azure AD conditional access templates

Finally, there is an easy way to deploy a base set of conditional access policies to users, devices and apps in a tenant. Microsoft calls it Conditional Access Templates and you will find them in Azure AD - Security - Conditional Access - Conditional Access Templates.

photo of grass field

Migrate to the new MFA authentication policies

There’s mandatory migration underway from SSPR and MFA settings to policy and you have until later this month to get them into place voluntarily or Microsoft will do it for you

empty road surrounded with green trees

Onboarding a new user with a single word

I’m going to show you how adding a single word to a user’s profile in Azure Active Directory (Azure AD) can kick off an entire onboarding process and move user add/remove from an IT task into an administrative assistant task.

green dart pointed to dartboard

How to achieve 100% on the Identity Secure Score

We have a sustained 100% secure score in Identity Security and you can too. There's an actual method and implementation process

New! Growth Focused Peer Group

This is a limited time opportunity to join a group in owner-led growth. Ready to take the growth of your business seriously? Willing to share and learn?

© 2025 – All rights reserved

Designed with Customizr Pro