Microsoft 365 Security
Microsoft 365 security, in depth.
Practical articles on Entra ID, Intune, Conditional Access, and device security.
Questions? info@tenantwizards.nl
-
Shadow AI in Microsoft 365: Find and Block It with Purview
Shadow AI leaks data without triggering a single alert. Use Entra Internet Access, Defender for Cloud Apps, and Microsoft Purview to find and block it in 4 steps.
-
Intune MDM vs MAM: When to use which approach
MDM controls the device, MAM controls the data. A decision matrix for IT admins, including the June 30 Conditional Access deadline you can't miss.
-
Social Engineering Exposed (1/3): How attackers get in without breaking anything
MGM lost $100M. Odido lost 6.2M records. Uber's systems went dark. None required a technical exploit. Just a phone call. Here's how it works.
-
Conditional Access enforcement changes May 13: check your exceptions now
Apps could bypass Conditional Access by requesting minimal sign-in scopes. Non-excluded apps slipped through silently for years. Starting May 13, that stops.