This is the 8th part of my Road to CE series, in this post we’ll look at Android and fully managing Android. Microsoft + Android MDM is a lot easier than Apple, that’ll be coming up in the next post. Initial Setup First follow the instructions on Connect your Intune account to your Managed Google […]
Tag: Cyber essentials
Road to Cyber Essentials: iOS
This is the 9th part of my Road to CE series, in this post we’ll look at iOS and fully managing iOS (iPhone/iPads), we’ll cover MacOS briefly as well for the initial setup, but MacOS will be a future post. Sadly Apple MDM in Intune isn’t as fluid as Android, but we’ll go through it. […]
This is the 7th part of my blog series on the Road to CE series. In today’s post we’ll look at Defender for Identity and Azure Identity Protection to assist with Cyber Essentials. One big area in Cyber Essentials is monitoring and removing access when a compromise occurs, Microsoft has tools built into Azure AD […]
Welcome to the 6th in the Road to CE series, this time we’re going to talk about Winget and the new application deployment methods in Intune. Winget and the new Store deployment method are a key pillar in CE, ensuring apps are up to date. This post was partially written with Bing Chat Compose. What […]
This is the 4th part of my blog series on the Road to CE series. We’ll be starting to look at the technical controls inside of AAD and Intune to assist with Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. As previous stated under Cyber Essentials you need to know the […]
This is the third in the Road to CE series, we’ll be talking about the written policies need to support Cyber Essentials, most of these will just be updates to existing policies. TLDR: Review and update your policies to enshrine the technical controls and accommodate for technical control feature lackings. If you don’t have an […]
Road to Cyber Essentials: The Pilot
This is the second in the Road to CE series of blog posts following Jisc’s full Cyber Essentials journey. In this part of our journey, we had a meeting with senior stakeholders as well as our IT Security teams, explored the requirements for Cyber Essentials and how best to achieve those for Jisc and scoping […]
Road to Cyber Essentials: The Start
Jisc are Cyber Essentials compliant, this will be a series of blog posts on how we achieved this. To start off you need to evaluate your digital estate, start small and expand from there. Your IdP will be your biggest asset in assisting with CE, make sure your systems use your IdP for login, try […]