CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
The Defender Alerts Nobody Looked At — Until It Was Too Late

The Defender Alerts Nobody Looked At — Until It Was Too Late

by CPI Staff | May 9, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR

Most security incidents do not begin with a total lack of telemetry. They begin with a signal that was already there, sitting in a queue, waiting for someone to decide whether it mattered. That is the uncomfortable reality for many Microsoft 365 environments....
How Conditional Access and Intune Work Together to Protect Your Business

How Conditional Access and Intune Work Together to Protect Your Business

by CPI Staff | May 9, 2026 | Blog, Endpoint Management, Endpoint Security, Entra ID, Microsoft Intune

Too many Microsoft 365 security projects stall at the same point. Multi-factor authentication is on, devices are enrolled, and policies exist in a few different admin portals, but leadership still cannot answer a simple question: can an unmanaged or unhealthy device...
How Intune Helps Businesses Control Devices Without Slowing People Down

How Intune Helps Businesses Control Devices Without Slowing People Down

by CPI Staff | May 5, 2026 | Blog, Endpoint Management, Microsoft Intune

Most businesses already know device sprawl is a problem. Laptops leave the office, personal phones access company email, new starters wait too long for setup, and IT teams end up choosing between control and convenience. That trade-off is usually a sign that device...
How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace

How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace

by CPI Staff | May 5, 2026 | Blog, Microsoft 365, Microsoft 365 Security

Most Microsoft 365 environments are deployed for productivity first and secured later, if at all. That is how many Australian businesses end up with the appearance of control without the substance of it. Email works. Teams works. Files sync. Staff can work from...
Why Microsoft 365 Security Is More Than Just Turning on MFA

Why Microsoft 365 Security Is More Than Just Turning on MFA

by CPI Staff | May 1, 2026 | Blog, Cloud Security, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security, Microsoft Intune, Microsoft Purview

When a business enables Multi-Factor Authentication and calls it “done,” they’ve taken one important step — but left the door wide open in a dozen other places. MFA blocks a significant portion of credential-based attacks. Microsoft’s own data...
The Intune Policy Gap That Leaves Company Devices Exposed

The Intune Policy Gap That Leaves Company Devices Exposed

by CPI Staff | Apr 30, 2026 | Blog, Cybersecurity, Endpoint Security, Microsoft Intune

Most organisations assume that once their devices are enrolled in Microsoft Intune, those devices are secure. That assumption is wrong — and it’s costing them. There is a default configuration in Intune that silently marks every device without a compliance...
« Older Entries

Recent Posts

  • The Defender Alerts Nobody Looked At — Until It Was Too Late
  • How Conditional Access and Intune Work Together to Protect Your Business
  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune