Real-world Microsoft 365 security projects & walkthroughs.
A sample of the work we do across Entra ID, Intune, Defender XDR, Purview, and Microsoft 365 email security. Each project highlights the problem, the approach, and the impact.
Conditional Access MFA Setup
Designing and rolling out Conditional Access policies to enforce MFA for admins and users in phases.
Sign-in Risk Policies
Using risk-based Conditional Access to challenge or block sign-ins from suspicious locations and devices.
Blocking Legacy Authentication
Gradually disabling legacy protocols and client apps that bypass modern authentication and MFA.
Improving Secure Score
Targeted remediation of top-risk actions to move Secure Score from the 30s into the 80s.
ASR Rule Baseline
Designing Attack Surface Reduction policies and phased rollouts to minimize disruption.
Intune Compliance Policy Setup
Defining baseline compliance policies for Windows and mobile devices tied into Conditional Access.
Data Classification Policies
Designing a practical sensitivity label taxonomy and mapping it to real-world use cases.
Insider Risk Management
Configuring insider risk policies to detect risky file exfiltration and anomalous activity.
DLP (Data Loss Prevention)
Building email, Teams, and endpoint DLP policies focused on a few high-value data types.
DMARC Setup
Implementing SPF, DKIM, and DMARC with a safe transition from monitoring to enforcement.
Tenant Allow/Block Lists
Using allow/block entries and Tenant Allow/Block List to handle edge cases without weakening security.
User Email Reporting
Rolling out phishing and spam reporting buttons and connecting them into Defender workflows.