CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

by CPI Staff | Apr 24, 2026 | Blog, Microsoft 365, Microsoft Intune, Windows 365

Too many IT teams are still managing endpoints through three different operating models at once. Physical laptops sit in one stack, remote access sits in another, and virtual desktops sit somewhere else again. That fragmentation is expensive. It slows onboarding,...

The North Korean Threat Actor Now Targeting macOS Fleets — and Why Your Intune for Mac Baseline Matters

by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR, Microsoft Intune

For years, Australian IT leaders treated macOS as the “quiet corner” of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple’s built-in protections were enough. That assumption no...
5 Signs Your Current IT Provider Isn’t Keeping Up in 2026

5 Signs Your Current IT Provider Isn’t Keeping Up in 2026

by CPI Staff | Feb 23, 2026 | Blog, Microsoft 365, Microsoft Intune

In this blog post 5 Signs Your Current IT Provider Isn’t Keeping Up in 2026 we will look at the warning signs that your IT partner is quietly falling behind—and what that means for cost, security, productivity, and compliance. If you’ve found yourself thinking, “We’re...
Enforce Device Compliance with Microsoft Intune

Enforce Device Compliance with Microsoft Intune

by CPI Staff | Feb 1, 2026 | Blog, Microsoft Intune

In this blog post Enforce Device Compliance with Microsoft Intune for Safer Access we will walk through how to use Microsoft Intune to define “good device hygiene,” measure it continuously, and then enforce it at sign-in time. The goal is simple: let productive work...
Block Personally Owned Devices with Microsoft Intune

Block Personally Owned Devices with Microsoft Intune

by CPI Staff | Jan 29, 2026 | Blog, Microsoft Intune

In this blog post Block Personally Owned Devices with Microsoft Intune for Better Security we will explain how to stop personally owned devices (BYOD) from enrolling into Intune, why it matters, and how to do it safely without breaking legitimate business workflows....
Intune Device Type Restriction Policies Explained

Intune Device Type Restriction Policies Explained

by CPI Staff | Jan 29, 2026 | Blog, Microsoft Intune

In this blog post Intune Device Type Restriction Policies Explained for IT Teams we will walk through what device type restriction policy is in Microsoft Intune, why it matters, and how to configure it in a practical way. At a high level, Intune device type...
« Older Entries
Next Entries »

Recent Posts

  • The Defender Alerts Nobody Looked At — Until It Was Too Late
  • How Conditional Access and Intune Work Together to Protect Your Business
  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune