Microsoft 365 Security

Microsoft 365 security, in depth.

Practical articles on Entra ID, Intune, Conditional Access, and device security.

Questions? info@tenantwizards.nl

  1. Danny Vorst 15 min read

    Shadow AI in Microsoft 365: Find and Block It with Purview

    Shadow AI leaks data without triggering a single alert. Use Entra Internet Access, Defender for Cloud Apps, and Microsoft Purview to find and block it in 4 steps.

    securityshadow aimicrosoft purviewdefender for cloud appsentra id
  2. Donny van Huizen 13 min read

    Intune MDM vs MAM: When to use which approach

    MDM controls the device, MAM controls the data. A decision matrix for IT admins, including the June 30 Conditional Access deadline you can't miss.

    intunemdmmambyodmicrosoft 365conditional accessmobile security
  3. Danny Vorst 7 min read

    Social Engineering Exposed (1/3): How attackers get in without breaking anything

    MGM lost $100M. Odido lost 6.2M records. Uber's systems went dark. None required a technical exploit. Just a phone call. Here's how it works.

    securitysocial engineeringidentity securitymfaphishingmicrosoft 365
  4. Danny Vorst 8 min read

    Conditional Access enforcement changes May 13: check your exceptions now

    Apps could bypass Conditional Access by requesting minimal sign-in scopes. Non-excluded apps slipped through silently for years. Starting May 13, that stops.

    microsoft 365securityconditional accessentra idmfaidentity securitypolicy