ConfigMgr Collection Evaluation Analysis The Easy Way
Hi, Jonas here! Or as we say in the north of Germany: "Moin Moin!"I’m a Microsoft Senior Cloud Solution Architect – Engineering (or short Sr. CSA-E) and in this article I want to talk about ConfigMgr Collection Evaluation. About a year ago ... continue reading
Azure Policies for Automating Azure Governance – Automating Policies
In my earlier Azure Policy post, I covered issues and concerns organizations may face and how many built in Azure policies can address these problems. Now we are going to take it a step further and discuss how to enforce policies ... continue reading
Mitigate risk by integrating threat modeling and DevOps processes
Agile and DevOps are without any doubt two of the biggest security trends of recent years. The rapid rise of the cloud has only fueled the need for flexibility and dynamicity. Therefore, it’s natural for developers and organizations to seek ... continue reading
Combatting Risky Sign-ins in Azure Active Directory
It is almost inevitable your organization will be targeted with malicious sign-in attempts to cloud apps. It is often the case an employee uses the same password for their work account as they do for their personal accounts. Password leaks ... continue reading

Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results
Yesterday, we shared some exciting news about the momentum we’re seeing in the security industry. Microsoft Chief Executive Officer Satya Nadella announced that Microsoft Security has surpassed USD20 billion in revenue. I’m grateful to all our customers and partners who ... continue reading
Digital event highlights new features in Microsoft Purview
Keeping your company and customer data secure has never been more complex. With multiple clouds, legacy on-premises systems, and numerous devices, it can be hard to keep track of what data you have and where it lives. On top of ... continue reading

Secure your business like you secure your home: 5 steps to protect against cybercrime
Running a business requires a lot of determination and sometimes a leap of faith. Every day brings a new challenge, and many times it can feel like the stress and uncertainty are too much. That’s when you remind yourself why ... continue reading
4 things to look for in a multicloud data protection solution
What does it mean to be a multicloud organization? As the name implies, the term describes a model of cloud computing where an organization uses multiple clouds—two or more public clouds, private clouds, or a combination of public, private, and ... continue reading
5 tips for IIS on containers: Bonus – IIS remote management
While the intent with the Microsoft Ignite session and this blog series was to provide 5 tips for running IIS workloads on Windows containers, we could not leave this one out – so here’s a bonus blog post for you! ... continue reading
Creating MFA Policies with Zero Trust Advanced Deployment Guide in Microsoft 365
Overview of Advanced Deployment Guides & Assistance As you most probably know, there are Advanced deployment guides available for you on your Microsoft 365 tenant. These are basically deployment guides that help you to configure different settings and onboard services ... continue reading