Co-authored by Ben Stott and Kelly Mathurin of the Jisc Cloud team. A major benefit of being a customer of the Microsoft 365 Education suite has for a long time been having access to unlimited storage across OneDrive, SharePoint and Exchange. This has meant that IT administrators haven’t needed to worry about capacity planning, […]
Category: Cloud advice
Advice on good practice when using cloud.
‘… the reality is that existing education establishments have been using their Microsoft 365 Tenants without any restrictions. This change, from their perspective, is a new restriction and will no doubt, be perceived as a price rise, since many education tenants are larger than 100TB.’ For further information see our advice paper: Advice and Guidance […]
This blog post is based on the presentation given by Dave Cook in our Jisc Cyber Community in April 2024. Who is this blog aimed at: IT Teams who administer and are responsible for Cloud estates and the security of them. What is the purpose of the blog: To help member/customer IT teams understand the […]
Quick blog post here explaining an Intune remediation to fix devices where they do not activate via a subscription. If your device looks like this then you don’t need to follow this guide If for any reason you have Not active in the subscription, this could mean that the CLIP Service store has become corrupt […]
Road to Cyber Essentials: Android
This is the 8th part of my Road to CE series, in this post we’ll look at Android and fully managing Android. Microsoft + Android MDM is a lot easier than Apple, that’ll be coming up in the next post. Initial Setup First follow the instructions on Connect your Intune account to your Managed Google […]
Road to Cyber Essentials: iOS
This is the 9th part of my Road to CE series, in this post we’ll look at iOS and fully managing iOS (iPhone/iPads), we’ll cover MacOS briefly as well for the initial setup, but MacOS will be a future post. Sadly Apple MDM in Intune isn’t as fluid as Android, but we’ll go through it. […]
This is the 7th part of my blog series on the Road to CE series. In today’s post we’ll look at Defender for Identity and Azure Identity Protection to assist with Cyber Essentials. One big area in Cyber Essentials is monitoring and removing access when a compromise occurs, Microsoft has tools built into Azure AD […]
Welcome to the 6th in the Road to CE series, this time we’re going to talk about Winget and the new application deployment methods in Intune. Winget and the new Store deployment method are a key pillar in CE, ensuring apps are up to date. This post was partially written with Bing Chat Compose. What […]
This is the 5th part of my blog series on the Road to CE series. We’ll be starting to look at using Excel to generate the report you need for Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. In sections of your Cyber Essentials you need include a list of Devices, […]
This is the 4th part of my blog series on the Road to CE series. We’ll be starting to look at the technical controls inside of AAD and Intune to assist with Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. As previous stated under Cyber Essentials you need to know the […]