Forgotten Features Series, Part 3: The Metadata Revolution You’re Missing – Custom Security Attributes
As a Managed Service Provider (MSP), you manage dozens or hundreds of customers across multiple tenants, each with different service…
Forgotten Features Series, Part 2: The Overlooked Control Layer – Administrative Units
Administrative Units in Microsoft Entra ID are one of those features that often fly under the radar – but they…
Forgotten Features Series, Part 1: The Legal Gatekeeper You Aren’t Using – Conditional Access – Terms of Use
This blog post demonstrates how to securely enforce organizational compliance and gain explicit, auditable user consent before granting access to…
MaesterDiff: Because Comparing Maesters Just Got Twice as Fun!
As Microsoft 365 environments grow in complexity, maintaining security and compliance becomes increasingly challenging. Maester provides excellent testing capabilities for…
How to secure your Enterprise Application via PIM
This blog post demonstrates how to securely enable Single Sign-On (SSO) for sensitive enterprise applications. While commonly used for tools…
Streamline Your Git Workflow: (semi)-automated Branch Cleanup with PowerShell
As developers and scripters, our local Git repositories can quickly become cluttered with old, merged, or orphaned branches. This accumulation…
“Everyone Gets the Same Toolbox” PowerShell Script
As someone who’s spent way too much time troubleshooting “it works on my machine” problems, I got tired of the…
Intune Anomalies Report
Every IT administrator knows the struggle of maintaining a clean and secure Microsoft Intune environment. Devices can fall out of…
Remote Speedtest in CLI: Easy & Quick Network Troubleshooting
As an IT professional, diagnosing performance issues often starts with ruling out the internet connection. Browser-based speed tests are slow…
M365 License Assignment Report
Every administrator knows the problem of licenses and their allocation. This is often a drama to get a good overview…
Entra ID Admin Roles Report
Every administrator knows the problem of managing roles and permissions. It’s often a struggle to get a good overview of…
🚀Introducing ASR Rule Inspector V2
After some incredibly valuable feedback and a few feature requests, I’m excited to share the next iteration of my ASR…
ASR Rules: The Importance of Configuration and Verifying with the “ASR Rule Inspector”
In today’s evolving threat landscape, cybercriminals continuously exploit vulnerabilities in systems and applications. Attack Surface Reduction (ASR) rules help mitigate…
Language Packs? I Just Told My Computer to ‘Figure It Out.’ Apparently, It Did.
Do you know that moment? You’ve got your Intune environment perfectly set up, Autopilot profiles configured, and you think, ‘Yes,…