Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Latest Posts
Data – The Fourth Pillar of Zero Trust
In this Zero Trust blog series, we’ve already explored how Identity, Devices, and Applications form the foundation of a modern…
Read More
Applications – The Third Pillar of Zero Trust
In the first two posts of this Zero Trust series, we established that identity is the new perimeter and devices…
Read More
Devices – The Second Pillar of Zero Trust
In the first post of this series, we explored how identity has become the new perimeter in a world where…
Read More
Identity: The New Perimeter in Zero Trust
Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know…
Read More
Zero Trust Blog Series: A Microsoft-Centric Approach
Over the past few years, I’ve seen a growing interest in Zero Trust but also a lot of confusion. Many…
Read More
Most Popular Posts (All Time)
#1
Mac OS connecting to Windows 365 and AVD
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#2
Deploying Azure Virtual Desktop – A Modular, Automated Approach
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#3
Privileged Identity Management and Access Tiers
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#4
Creating a local SMTP relay using Postfix and SendGrid
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#5
Always On VPN Entra Join – Part 5 Deploy Always On VPN for Entra Joined Devices
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
Trending Posts (Last 7 Days)
#1
Mac OS connecting to Windows 365 and AVD
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#2
Deploying Azure Virtual Desktop – A Modular, Automated Approach
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#3
Privileged Identity Management and Access Tiers
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#4
Creating a local SMTP relay using Postfix and SendGrid
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#5
Always On VPN Entra Join – Part 5 Deploy Always On VPN for Entra Joined Devices
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
Most Reacted Posts
#1
Mac OS connecting to Windows 365 and AVD
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#2
Data – The Fourth Pillar of Zero Trust
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More
#3
Applications – The Third Pillar of Zero Trust
Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Read More