Welcome to the 6th in the Road to CE series, this time we’re going to talk about Winget and the new application deployment methods in Intune. Winget and the new Store deployment method are a key pillar in CE, ensuring apps are up to date. This post was partially written with Bing Chat Compose. What […]
Category: Cloud advice
Advice on good practice when using cloud.
This is the 5th part of my blog series on the Road to CE series. We’ll be starting to look at using Excel to generate the report you need for Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. In sections of your Cyber Essentials you need include a list of Devices, […]
This is the 4th part of my blog series on the Road to CE series. We’ll be starting to look at the technical controls inside of AAD and Intune to assist with Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. As previous stated under Cyber Essentials you need to know the […]
This is the third in the Road to CE series, we’ll be talking about the written policies need to support Cyber Essentials, most of these will just be updates to existing policies. TLDR: Review and update your policies to enshrine the technical controls and accommodate for technical control feature lackings. If you don’t have an […]
Road to Cyber Essentials: The Pilot
This is the second in the Road to CE series of blog posts following Jisc’s full Cyber Essentials journey. In this part of our journey, we had a meeting with senior stakeholders as well as our IT Security teams, explored the requirements for Cyber Essentials and how best to achieve those for Jisc and scoping […]
Road to Cyber Essentials: The Start
Jisc are Cyber Essentials compliant, this will be a series of blog posts on how we achieved this. To start off you need to evaluate your digital estate, start small and expand from there. Your IdP will be your biggest asset in assisting with CE, make sure your systems use your IdP for login, try […]
Microsoft365DSC is an Open-Source initiative lead by Microsoft engineers and maintained by the community. It allows tenant admins to write a definition for how your Microsoft 365 tenant should be configured, automate the deployment of that configuration and ensures the monitoring of the defined configuration, notifying and acting on detected configuration drifts. It also allows […]
Automate automate automate, that should be part of my job title. In this post I’m going to talk about a lesser known feature of Azure AD, which is now available to anyone with A3/E3 or above, group based licensing. With Microsoft’s retirement of the AzureAD and MSOL modules (replaced with MSGraph) you will need to […]
I am hearing increasing reports of UK academic institutions suffering from ramsomware attacks. These are now happening much more frequently than in the past and the consequences, in some cases at least, can be devastating. It is no longer a question of if you will be attacked but when you will be attacked and how […]
A recording of the recent session run by Paul Martin of Fortinet at the Jisc Security Conference. The session covers Jisc’s Managed Website Protection service and how that helps institutions and organizations mitigate against the evolving security threat landscape.