Endpoint Security configure it with Intune

Security you already own, applied properly. This article explains what each Intune Endpoint security blade does and what Endpoint Security settings you can configure with Intune, which licence unlocks it, and where it pays off. Turn windows security you already own into a consistent, centrally enforced baseline. Switch on the Defender for Endpoint connector, and […]


Zero Trust Assessment How To Guide for Microsoft 365 Security

Microsoft’s Zero Trust Assessment gives you a structured way to understand how closely your Microsoft 365 tenant aligns with modern security expectations. It reviews core identity, device, access and logging configurations, then produces a clear report with practical guidance. Never miss an article and subscribe, and don’t forget to subscribe to my YouTube channel, Control Alt […]


Managing Windows 11 Updates with Intune Update Rings and Feature Updates

Keeping Windows devices secure with intune update rings and feature updates and consistent across an organisation can be a challenge. Microsoft Intune helps administrators manage updates in a structured way, using two main tools: update rings and feature updates. Together, they give you control over when, how, and what version of Windows 11 gets installed, […]


Manage Intune Windows 11 25H2 Settings to Block Recall, Remove Bloatware, and Control Copilot

Windows 11 version 25H2 brings new management options to Microsoft Intune, giving administrators more control over privacy, AI features, and the overall user experience. This article explains how to use Intune Windows 11 25H2 settings to block the Recall feature tenant-wide, remove unwanted Microsoft Store apps, disable Copilot, and configure a consistent Start menu layout. […]


Microsoft Intune Settings Catalog Windows 11 25H2 Update

The Microsoft Intune Settings Catalog Windows 11 25H2 update introduces 36 new settings as part of Microsoft’s day-zero support for the latest version of Windows 11. This ensures IT administrators can configure and manage devices running Windows 11 version 25H2 as soon as it becomes available, whether in test, pilot, or production environments. The Settings […]


How to Use Intune Device Cleanup Rules and Audit Logs to Manage Stale Devices

Intune Device Cleanup Rules help keep your tenant organised, ensuring accurate reporting, faster troubleshooting, and a cleaner device inventory. In this guide, I will walk through how to add a user as an Intune Administrator, set up Device Cleanup Rules, and view Audit Logs to confirm which devices have been hidden. I’ll also explain what […]


Insider Threats in Office 365 A Practical Guide for IT Admins

What are insider threats? Insider threats are risks caused by people who already have legitimate access to your systems and data, employees, contractors, partners, volunteers, or students. They also include compromised insiders, where an attacker abuses a real user’s account. Motives range from mistakes and convenience through to financial gain, coercion, grievance, or curiosity. Never […]


Entra ID phishing-resistant MFA staged rollout with Authentication Strengths

Phishing keeps bypassing legacy MFA. Reverse-proxy kits intercept one-time codes and session cookies, allowing attackers to sidestep prompts entirely. Microsoft Entra ID’s phishing-resistant MFA blocks this by binding sign-in to a device-backed key, such as passkeys, FIDO2 security keys, or Windows Hello for Business and requiring real user presence. You can pilot it in Report-only […]