• Home
  • About
  • Consultancy
  • Blog
  • Tools
  • Contact

Blog

Filter by label

All postsAutomationAzureBackup & RecoveryCloud InfrastructureComplianceConditional AccessConfigurationCyber SecurityDNSEndpointEntra IDFirewallGovernanceIAMIdentityIntuneM365MonitoringNetworkingPowerShellScriptsSecurity OperationsStorageVirtualisationWindows ServerZero Trust
  • Conditional access patterns that survive real users

    November 12, 2025

    Structuring Entra ID policies so security improves without endless exclusions.

    • Entra ID
    • Conditional Access
    • Zero Trust
  • Intune rollout checklist for Windows 11

    October 28, 2025

    A practical order of operations before you flip enforcement policies.

    • Intune
    • Configuration
    • Endpoint
  • Running a restore drill without the drama

    September 5, 2025

    Why quarterly test restores beat a perfect backup policy on paper.

    • Azure
    • Backup & Recovery
    • Monitoring
  • PowerShell guardrails for admin workstations

    August 19, 2025

    Constrained language, logging, and approval flows for high-privilege sessions.

    • PowerShell
    • Governance
    • Compliance
  • DNS hygiene notes for a zero-trust network

    July 22, 2025

    Split-horizon, logging, and filtering without turning your helpdesk into a ticket factory.

    • DNS
    • Networking
    • Cyber Security