I've failed you, and for that I am sorry. I write a lot, and about a number of topics, but often I wait to write until I find something truly compelling to write about. And usually, working in an … more
As of January, Microsoft announced that Staffhub is out of preview! Staffhub is available for free to Office 365 subscribers with a K1, E1, E3 or E5 plan. Staffhub is a great addition to … more
Great news! Microsoft announced at the end of 2016 that mailbox sizes for Office 365 E3 & E5 plans were increasing from 50 GB to 100 GB! This is just for the main user mailbox. … more
This is a guest post, written by...Cupid.
Back in the day, I was unrivaled in my role as the bringer of true love. The old saying really is true – you snooze, you lose. I thought my … more
We are pleased to announce that we now are authorized to conduct certified Microsoft Customer Immerson Sessions at your location!
What is a CIE? A CIE is a highly interactive and engaging … more
A persistent, ongoing challenge with managing EMS has been the wildly disparate administration requirements. I’ve talked…at length…before about the 7 different portals I have to … more
Enterprise Mobility + Security (EMS) has a ton of features. That’s no secret: I do Intune, MFA, and AAD Connect password write-back configurations all the time, and our SharePoint team does a … more
Hot off the presses, last night Microsoft released GA pricing details for Azure Active Directory Domain Services. The smaller two tiers have been aggregated, will be renamed “S1 Domain Services … more
One of the biggest challenges in migrating to Office 365 is managing DNS changes.
Most of my migrations have been environments that manage their own internal DNS, and allow either their ISP or a … more
A few weeks ago I did some testing with Windows Defender Advanced Threat Protection. I ran into a few hurdles, crossed a few bridges, and apparently caught the attention of some people who truly care … more
Posted: 12/7/2017 4:34 PM
Securing your environment in a cloud-first world is a challenge. We’ve beaten the drum of “assume breach”, we’ve hammered the protect/detect/respond nail to death, but threat …