Need to Know podcast–Episode 345

Join me for the latest news an updates from the Microsoft Cloud just on eve of Microsoft Build. Microsoft 365 Copilot Wave 2 is upon u and I provide some thoughts and information on what to expect as well as some thoughts around why data is the important thing to consider with AI rather than which model might currently be better. Listen along and let me know your thoughts.

Brought to you by www.ciaopspatron.com

you can listen directly to this episode at:

https://ciaops.podbean.com/e/episode-345-its-all-about-the-data/

Subscribe via iTunes at:

https://itunes.apple.com/au/podcast/ciaops-need-to-know-podcasts/id406891445?mt=2

or Spotify:

https://open.spotify.com/show/7ejj00cOuw8977GnnE2lPb

Don’t forget to give the show a rating as well as send me any feedback or suggestions you may have for the show.

Resources

@directorcia

Join my shared channel

CIAOPS merch store

Become a CIAOPS Patron

CIAOPS Blog

CIAOPS Brief

CIAOPSLabs

Support CIAOPS

Microsoft 365 Copilot Wave 2 Spring updates

Microsoft 365 Copilot: Built for the era of human–agent collaboration

2025 release wave 1 brings hundreds of updates to Microsoft Dynamics 365 and Power Platform

What’s new in Copilot Studio: April 2025

Researcher agent in Microsoft 365 Copilot

Analyst agent in Microsoft 365 Copilot

What’s new in the Microsoft 365 Copilot app – April 2025

Announcing Public Preview of DLP for M365 Copilot in Word, Excel, and PowerPoint

Explore practical best practices to secure your data with Microsoft Purview​​

Project Manager in Planner Demo

What’s new in Microsoft Intune: April 2025

Introducing ActorInfoString: A New Era of Audit Log Accuracy in Exchange Online

Advanced deployment guide for Conditional Access Policy templates

Enforce device compliance and app protection policies on BYOD with M365 Business premium

image

M365 Business Premium is well-suited for this because it includes key components like:

  • Microsoft Intune (Part of Microsoft Endpoint Manager): For Mobile Device Management (MDM) and Mobile Application Management (MAM).

  • Azure Active Directory (Azure AD) Premium P1: Provides Conditional Access policies, which are crucial for enforcement.

  • Information Protection Features: For data security.

Here’s a step-by-step approach, focusing on the least intrusive but effective methods for BYOD:

Core Strategy: Prioritize App Protection Policies (MAM) without Full Device Enrollment (MDM)

This is often the preferred approach for BYOD because it protects corporate data within specific apps without taking full control over the user’s personal device. It respects user privacy while securing business information.

Steps:

  1. Configure App Protection Policies (APP / MAM Policies):

    • Go to the Microsoft Endpoint Manager admin center: (endpoint.microsoft.com)

    • Navigate: Apps > App protection policies.

    • Create Policy: Click “+ Create policy” and select the platform (iOS/iPadOS or Android).

    • Basics: Give the policy a descriptive name (e.g., “BYOD App Protection – Android”).

    • Apps:
      • Target policy to: Select “All Public Apps” or “Selected Apps”. For BYOD, often start with core Microsoft apps (Outlook, Teams, OneDrive, Edge, Office apps). You can add other MAM-enabled apps later.

      • Important: This policy only applies to apps that support Intune App Protection.
    • Data Protection: This is the core. Configure settings like:

      • Prevent backup: Block backing up work data to personal cloud storage (iCloud/Google Cloud).

      • Restrict cut, copy, paste: Control data movement between managed (work) apps and unmanaged (personal) apps. Often set to “Policy managed apps”.

      • Encryption: Ensure app data is encrypted. (Usually enabled by default).

      • Screen capture: Block screen capture for Android (iOS requires device management).

      • Save copies of org data: Prevent saving work files to local/personal storage. Allow saving only to managed locations like OneDrive for Business or SharePoint.

      • Receive data from other apps: Control if managed apps can receive data from unmanaged apps.

      • Open data in Org documents: Control which apps can open work documents.
    • Access Requirements: Define how users access the protected apps:

      • PIN for access: Require a separate PIN (or biometrics) to open the work apps. Configure PIN complexity and timeout.

      • Work or school account credentials for access: Force re-authentication after a period of inactivity.
    • Conditional Launch: Set conditions that must be met for the app to launch (e.g., block rooted/jailbroken devices, minimum OS version, app version).

    • Assignments:
      • Target: Assign the policy to specific Azure AD user groups containing your BYOD users. Do not assign to device groups for MAM-without-enrollment.
    • Review + Create: Finalize and create the policy.
  2. Configure Conditional Access Policies in Azure AD:

    • This is how you enforce the use of protected apps and check device state (even without full enrollment).

    • Go to the Microsoft Endpoint Manager admin center or Azure AD portal: (portal.azure.com)

    • Navigate: Endpoint Security > Conditional Access (in MEM) or Azure Active Directory > Security > Conditional Access (in Azure Portal).

    • Create New Policy:
      • Name: Give it a clear name (e.g., “CA – Require App Protection for Mobile Access”).

      • Assignments > Users and groups: Target the same user groups as your App Protection Policy.

      • Assignments > Cloud apps or actions: Select the specific M365 services you want to protect (e.g., Exchange Online, SharePoint Online, Teams). Start with “Office 365” (which covers multiple services).

      • Assignments > Conditions > Device platforms: Configure this policy to apply only to iOS and Android.

      • Assignments > Conditions > Client apps: Configure this to apply to “Mobile apps and desktop clients” > “Modern authentication clients” > Select “Mobile apps”.

      • Access Controls > Grant:
        • Select “Grant access”.

        • Choose “Require app protection policy”.

        • Optional but Recommended: Also choose “Require approved client app”. This ensures users are using MAM-capable apps (like Outlook Mobile instead of native mail clients).

        • For “Multiple controls”: Select “Require all the selected controls”.
      • Enable policy: Set to “On”.

      • Create: Save the policy.

User Experience with this Approach:

  1. The user installs a managed app (e.g., Outlook) from the public app store.

  2. They sign in with their work (Azure AD) account.

  3. Conditional Access checks if access is allowed. The policy requires an app protection policy.

  4. The user is prompted that their organization protects data in the app. They may be prompted to install the Microsoft Authenticator (on Android) or the Company Portal app (on iOS/Android). Crucially, they do NOT need to fully enroll their device via the Company Portal. The Company Portal app simply needs to be present to receive and report the APP status.

  5. The App Protection Policy settings are applied to the app (e.g., PIN required, copy/paste restrictions).

  6. The user can now securely access work data within that managed app. Their personal apps and data remain untouched and unmanaged.


Alternative/Additional Strategy: Device Compliance (Requires Enrollment – MDM)

If you need stronger device-level controls (e.g., enforcing screen lock complexity on the device itself, checking for device encryption, ensuring minimum OS), you need users to enroll their devices into Intune (MDM). This is more intrusive for BYOD and users might resist.

Steps (If Choosing Enrollment):

  1. Configure Enrollment Restrictions: (MEM Admin Center > Devices > Enroll devices > Enrollment device platform restrictions) Ensure personal iOS/Android devices are allowed to enroll if you intend to support this.

  2. Create Device Compliance Policies: (MEM Admin Center > Devices > Compliance policies)

    • Create separate policies for iOS and Android.

    • Configure settings like: Minimum/Maximum OS Version, Require PIN/Password, Require Encryption, Device Threat Level (if using Defender for Endpoint), Block rooted/jailbroken devices.

    • Assign these policies to user groups.
  3. Modify/Create Conditional Access Policies:
    • Instead of (or in addition to) “Require app protection policy,” add the grant control “Require device to be marked as compliant”.

    • You can combine these: Require a compliant device AND require app protection policy for maximum security on enrolled BYOD devices.

User Experience with Enrollment:

  1. User installs the Company Portal app.

  2. User signs in and follows the prompts to enroll their device. This grants Intune management capabilities over the device.

  3. Intune checks the device against the assigned Compliance Policy.

  4. If compliant, the device is marked as such in Azure AD.

  5. Conditional Access policies check for this compliance status before granting access to corporate resources.

  6. App Protection Policies can still be applied for layered data security within apps, even on enrolled devices.

Summary & Recommendation:

  • For BYOD, start with App Protection Policies (MAM) without enrollment, enforced by Conditional Access requiring App Protection and Approved Client Apps. This provides strong data security within work apps with minimal impact on the user’s personal device.

  • Use Device Compliance Policies (MDM) requiring enrollment only if you have specific, strong requirements for device-level settings and your users consent to this level of management on their personal devices.

  • Always communicate clearly with users about what is being managed and why, especially with BYOD.

  • Test thoroughly with pilot groups before rolling out broadly.

By leveraging App Protection Policies and Conditional Access, Microsoft 365 Business Premium offers a powerful and flexible way to secure corporate data on BYOD smartphones while respecting user privacy.

Storage limits for Microsoft 365 Business Premium and Microsoft 365 Enterprise E5

storage

The main differences lie in OneDrive per-user storage potential and Exchange Online mailbox/archive sizes and capabilities. SharePoint storage calculation is generally the same, but E5 often caters to larger organizations, potentially leading to more overall pooled storage.

Here’s a comparison table:

Feature/Service Microsoft 365 Business Premium Microsoft 365 Enterprise E5 Key Difference
OneDrive for Business
(Per-User File Storage)
1 TB per user (default)
Can often be increased by admin to 5 TB, sometimes 25 TB under specific conditions.
Starts at 1 TB per user
Admin can increase to 5 TB, then 25 TB. For plans with 5+ users, can request unlimited (initially provisioned as 25 TB, then 25 TB SharePoint site collections per user).
Business Premium maxes out (typically 5TB/25TB), E5 can go beyond with admin steps.
SharePoint Online
(Tenant Pooled Storage)
1 TB base tenant storage + 10 GB per licensed user
Storage is pooled across all sites.
1 TB base tenant storage + 10 GB per licensed user
Storage is pooled across all sites.
No difference in calculation. Total pooled storage depends on user count.
E5 tenants might have more total storage due to higher user counts typically.
Exchange Online
(Primary Mailbox)
50 GB Primary Mailbox
(Comes with Exchange Online Plan 1)
100 GB Primary Mailbox
(Comes with Exchange Online Plan 2)
E5 has double the primary mailbox size (due to Exchange Online Plan 2 vs Plan 1).
Exchange Online
(Archive Mailbox)
50 GB Archive Mailbox
(Standard, separate archive)
1.5 TB Archive Mailbox (Initially 100GB)
Auto-Expanding Archiving enabled by default.
Business Premium has a fixed 50 GB archive. E5’s archive can grow massively.
Microsoft Teams
(File Storage)
Files stored in SharePoint/OneDrive.
Subject to those respective limits.
Files stored in SharePoint/OneDrive.
Subject to those respective limits.
No direct difference. Storage limits are dictated by SharePoint/OneDrive.
Stream (on SharePoint)
(Video Storage)
Videos stored in SharePoint/OneDrive.
Subject to those respective limits.
Videos stored in SharePoint/OneDrive.
Subject to those respective limits.
No direct difference. Storage counts against SharePoint/OneDrive pooled storage.

Key Takeaways & Nuances:

  1. OneDrive: The biggest potential difference. While both start at 1 TB, E5 offers a path to effectively unlimited storage per user (requires admin configuration and meeting criteria like having 5+ E5 licenses). Business Premium has clearer upper limits (usually 5 TB or potentially 25 TB with admin intervention).

  2. Exchange Mailbox: E5 provides significantly larger primary mailboxes (100 GB vs 50 GB).

  3. Exchange Archive: This is a major E5 advantage. Business Premium has a standard 50 GB archive. E5 includes Auto-Expanding Archiving, which starts larger (100 GB) and can automatically grow up to 1.5 TB, removing significant storage headaches for long-term email retention.

  4. SharePoint: The calculation for pooled tenant storage is identical (1 TB base + 10 GB per user). An organization with E5 licenses might have more total SharePoint storage simply because they have more users, but the formula per user is the same.

  5. Admin Action: Increasing OneDrive storage beyond the initial 1 TB (in either plan) usually requires administrator configuration. The “unlimited” OneDrive in E5 requires specific admin steps and meeting license count prerequisites.

  6. Add-on Storage: Both plans allow for purchasing additional SharePoint storage if the pooled limit is reached.

In summary, Microsoft 365 E5 offers substantially more generous storage limits and capabilities, particularly for individual user file storage (OneDrive potential) and email archiving (Exchange Online Auto-Expanding Archive). Business Premium provides ample storage for many small-to-medium businesses but has stricter upper bounds compared to E5’s potential.

CIA Brief 20250503

image

What’s new in Copilot Studio: April 2025 –

https://www.microsoft.com/en-us/microsoft-copilot/blog/copilot-studio/whats-new-in-copilot-studio-april-2025/

2025 release wave 1 brings hundreds of updates to Microsoft Dynamics 365 and Power Platform –

https://www.microsoft.com/en-us/dynamics-365/blog/business-leader/2025/04/30/2025-release-wave-1-brings-hundreds-of-updates-to-microsoft-dynamics-365-and-power-platform/

McGees Property secures its future after ransomware attack –

https://www.youtube.com/watch?v=T6RaAuPXrcQ

Microsoft 365 Copilot Wave 2 Spring updates –

https://www.youtube.com/watch?v=Y-taqarhCao

aster, more personalized service begins at the frontline with Microsoft Intune –

https://www.microsoft.com/en-us/security/blog/2025/04/28/faster-more-personalized-service-begins-at-the-frontline-with-microsoft-intune/

Enhancing Cybersecurity for Nonprofits with Microsoft Defender –

https://techcommunity.microsoft.com/blog/nonprofittechies/enhancing-cybersecurity-for-nonprofits-with-microsoft-defender/4383058

What’s new in Microsoft Intune: April 2025 –

https://techcommunity.microsoft.com/blog/microsoftintuneblog/whats-new-in-microsoft-intune-april-2025/4408094

Announcing General Availability: Microsoft Sentinel Solution for Microsoft Business Applications –

https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-general-availability-microsoft-sentinel-solution-for-microsoft-busine/4406758

How agentic AI is driving AI-first business transformation for customers to achieve more –

https://blogs.microsoft.com/blog/2025/04/28/how-agentic-ai-is-driving-ai-first-business-transformation-for-customers-to-achieve-more/

Project Manager in Planner Demo –

https://www.youtube.com/watch?v=WpQpjey1L3Q

Introducing more control over Direct Send in Exchange Online –

https://techcommunity.microsoft.com/blog/exchange/introducing-more-control-over-direct-send-in-exchange-online/4408790

The Crucial Role of Data Security Posture Management in the AI Era –

https://techcommunity.microsoft.com/blog/microsoft-security-blog/the-crucial-role-of-data-security-posture-management-in-the-ai-era/4408308

After hours

The Rise of AI in Factories – https://www.youtube.com/watch?v=Yx1UEdDii5s

Editorial

If you found this valuable, the I’d appreciate a ‘like’ or perhaps a donation at https://ko-fi.com/ciaops. This helps me know that people enjoy what I have created and provides resources to allow me to create more content. If you have any feedback or suggestions around this, I’m all ears. You can also find me via email director@ciaops.com and on X (Twitter) at https://www.twitter.com/directorcia.

If you want to be part of a dedicated Microsoft Cloud community with information and interactions daily, then consider becoming a CIAOPS Patron – www.ciaopspatron.com.

Watch out for the next CIA Brief next week

Getting beyond just emails with Microsoft 365

bp1

Getting employees to move beyond the familiar (email, basic file storage) requires a thoughtful and multi-faceted strategy. Simply *having* the tools isn’t enough; you need to address awareness, skill, motivation, and integration.

Here’s an effective strategy broken down into actionable steps:

Phase 1: Assessment & Planning

  1. Understand the “Why”:

    • Survey/Interviews: Talk to employees (or a representative sample). Why aren’t they using other tools? Common reasons include:

      • Lack of awareness (don’t know what’s available).

      • Lack of understanding (don’t know how to use them).

      • Lack of perceived value (don’t see the benefit over current methods).

      • Lack of time to learn.

      • Resistance to change (“Email works fine for me”).

      • No clear expectation or direction from leadership.
    • Identify Pain Points: Ask what their biggest daily frustrations or time-wasters are (e.g., finding documents, managing tasks, collaborating on reports, endless email chains). This helps you map M365 tools to solve their actual problems.

    • Analyze Current Usage (if possible): Use the Microsoft 365 admin center reports to get baseline data on which services are being used, even minimally.
  2. Identify High-Impact Use Cases & Target Tools:

    • Don’t try to push everything at once. Based on the pain points identified, select 2-3 tools or features with the highest potential impact. Examples:

      • Problem: Endless internal email chains, difficulty tracking conversations. Solution: Microsoft Teams (Chat, Channels).

      • Problem: Difficulty managing team tasks or small projects. Solution: Microsoft Planner (integrated into Teams).

      • Problem: Version control chaos, difficulty collaborating on documents. Solution: SharePoint/Teams file storage with co-authoring & version history (moving beyond personal OneDrive).

      • Problem: Repetitive manual tasks (e.g., approvals, notifications). Solution: Simple Power Automate flows.

      • Problem: Collecting feedback or simple data. Solution: Microsoft Forms.
    • Define Clear Scenarios: Instead of saying “Use Teams,” say “Use Teams chat for quick internal questions instead of email,” or “Use the ‘Project Alpha’ Team channel for all discussions and file sharing related to that project.”

Phase 2: Execution & Engagement

  1. Secure Leadership Buy-in & Role Modeling:

    • This is CRUCIAL. If managers and leaders aren’t using the tools, employees won’t either.

    • Brief leadership on the strategy and the business benefits (efficiency, collaboration, knowledge sharing).

    • Encourage leaders to actively use the target tools (e.g., post announcements in Teams, manage their team tasks in Planner, share files via SharePoint/Teams links).
  2. Targeted Communication & Awareness Campaign:

    • Focus on “What’s In It For Me?” (WIIFM): Communicate the benefits to the employee, not just the features. (e.g., “Spend less time searching for files,” “Reduce email clutter,” “Collaborate easier with your team”).

    • Use Multiple Channels: Emails, intranet posts, team meeting announcements, short videos, posters.

    • Showcase Success Stories: Highlight teams or individuals who are already using the tools effectively.

    • Regular Tips & Tricks: Send out short, actionable tips related to the target tools/use cases.
  3. Provide Practical, Contextual Training:

    • Variety of Formats: Offer different learning styles – live workshops (virtual or in-person), short recorded video tutorials, quick reference guides (QRG), lunch-and-learn sessions.

    • Scenario-Based: Train on how to accomplish specific tasks relevant to their jobs using the tools (e.g., “How to co-author a report in Teams,” “How to manage your project tasks with Planner”), not just abstract feature overviews.

    • Keep it Short & Focused: Micro-learning is often more effective than long, overwhelming sessions.

    • Leverage Microsoft Resources: Point employees to Microsoft Learn, built-in help features, and templates.
  4. Integrate Tools into Existing Workflows:

    • Identify specific business processes where the new tools can replace older, less efficient methods.

    • Example: Mandate that all documents for a specific team project must be stored and collaborated on within the designated Team/SharePoint site, not emailed as attachments.

    • Example: Set up a Planner board for a recurring team process and make it the standard way to track progress.

    • Make it the path of least resistance over time.
  5. Establish Champions & Support Systems:

    • Identify “Champions”: Find enthusiastic early adopters in different departments. Provide them with extra training and empower them to help their colleagues. Recognize their efforts.

    • Provide Clear Support Channels: Make it easy for employees to ask questions – a dedicated Teams channel, help desk support, regular Q&A sessions.

    • Create a Resource Hub: A simple SharePoint page or Teams tab with links to training materials, FAQs, guides, and champion contacts.

Phase 3: Reinforcement & Iteration

  1. Gamification & Incentives (Optional but can be effective):

    • Introduce friendly competitions or challenges related to tool usage (e.g., “Team with the best-organized SharePoint site,” “Most helpful answer in the Q&A channel”).

    • Offer small rewards or recognition for participation or achieving milestones.
  2. Gather Feedback & Measure Progress:

    • Regularly check usage statistics in the M365 admin center.

    • Conduct follow-up surveys or quick polls to gauge understanding and satisfaction.

    • Ask champions and managers for qualitative feedback.

    • Track whether the initial pain points are being addressed.
  3. Iterate and Expand:

    • Based on feedback and results, refine your approach. What’s working? What’s not?

    • Once adoption of the initial target tools improves, gradually introduce new tools or more advanced features, following the same principles.

    • Don’t stop communicating and training – adoption is an ongoing process.

Key Principles:

  • Start Small & Focused: Don’t overwhelm people.

  • Focus on Value & Problem Solving: Answer the “WIIFM”.

  • Make it Easy: Provide clear guidance, training, and support.

  • Lead by Example: Leadership involvement is non-negotiable.

  • Be Persistent & Patient: Change takes time.

By implementing this structured approach, focusing on employee needs and benefits, and providing ongoing support, you can significantly increase the adoption and effective use of the powerful tools within Microsoft 365 Business Premium.

CIAOPS Need to Know Microsoft 365 Webinar – May

laptop-eyes-technology-computer_thumb

Join me for the free monthly CIAOPS Need to Know webinar. Along with all the Microsoft Cloud news we’ll be taking a look at OneDrive for BUsiness in Microsoft 365.

Shortly after registering you should receive an automated email from Microsoft Teams confirming your registration, including all the event details as well as a calendar invite.

You can register for the regular monthly webinar here:

May Webinar Registrations

(If you are having issues with the above link copy and paste – https://bit.ly/n2k2505)

The details are:

CIAOPS Need to Know Webinar – May 2025
Tuesday 27th of May 2025
11.00am – 12.00am Sydney Time

All sessions are recorded and posted to the CIAOPS Academy.

The CIAOPS Need to Know Webinars are free to attend but if you want to receive the recording of the session you need to sign up as a CIAOPS patron which you can do here:

http://www.ciaopspatron.com

or purchase them individually at:

http://www.ciaopsacademy.com/

Also feel free at any stage to email me directly via director@ciaops.com with your webinar topic suggestions.

I’d also appreciate you sharing information about this webinar with anyone you feel may benefit from the session and I look forward to seeing you there.

Starting point for implementing Intune security policies

image

This plan focuses on establishing foundational security controls across your diverse devices, leveraging the integrated features of M365 BP.

Core Concepts:

  • Microsoft Intune: Your cloud-based Mobile Device Management (MDM) and Mobile Application Management (MAM) solution.

  • Azure Active Directory (Azure AD): Your identity provider. User accounts and groups live here. It’s tightly integrated with Intune.

  • Configuration Profiles: These define settings and restrictions pushed to managed devices (MDM).

  • Application Protection Policies (APP / MAM): These protect organizational data within specific apps, useful for both corporate and personally owned (BYOD) devices, without requiring full device enrollment.

  • Compliance Policies: Define rules devices must meet to be considered “compliant” (e.g., have encryption enabled, be updated).

  • Conditional Access (CA): The powerhouse feature (included in M365 BP via Azure AD Premium P1 features) that uses signals (like user, location, device compliance) to enforce organizational policies (like requiring MFA or blocking access from non-compliant devices).

Assumptions:

  • You have Microsoft 365 Business Premium licenses assigned to all 20 users.

  • You have Global Administrator access to your Microsoft 365 tenant.

  • Your users are licensed and exist in Azure AD.

Step-by-Step Implementation Plan:

Phase 1: Preparation & Foundational Setup

  1. Access the Endpoint Manager Admin Center:

  2. Set MDM Authority to Intune:

    • Navigate to Tenant administration > Tenant status.

    • Verify that the Mobile device management authority is set to Microsoft Intune. If it’s something else (like Office 365 MDM or Configuration Manager), you’ll need to change it. This is usually a one-time setting for new tenants. Be careful if you have existing MDM.
  3. Configure Enrollment Settings (Enable Platforms):

    • You need to explicitly allow each device platform to enroll.

    • Windows: Go to Devices > Enroll devices > Windows enrollment > Automatic Enrollment.

      • Set MDM user scope to All (or a specific Pilot Group first).

      • Set MAM user scope to All (or Pilot Group). This enables MAM without full enrollment for BYOD Windows.
      • Recommendation: Also configure DNS CNAME records (enterpriseenrollment and enterpriseregistration) pointing to Microsoft’s services to simplify Windows enrollment. Search Microsoft Docs for “Configure DNS for Intune Windows enrollment”.
    • Apple (iOS/iPadOS & macOS): Go to Devices > Enroll devices > Apple enrollment.

      • You must create an Apple Push Notification service (APNs) certificate. Follow the Apple MDM Push certificate link and instructions carefully. This certificate needs renewal annually. Set reminders!

      • For macOS enrollment methods, initially, users can enroll via the Company Portal app.

      • For iOS/iPadOS enrollment methods, users can enroll via the Company Portal app.

      • (Advanced/Recommended for corporate devices later: Consider Apple Business Manager integration for supervised enrollment).
    • Android: Go to Devices > Enroll devices > Android enrollment.

      • Click Managed Google Play and connect your Intune tenant to your organization’s Managed Google Play account. Follow the instructions. This is required for most Android management scenarios.

      • Decide on enrollment profiles. For a mix of BYOD and potentially corporate devices, enabling Android Enterprise: Personally-owned devices with work profile is the most common starting point for BYOD. This creates a secure container for work apps/data separate from personal data.
  4. Create User Groups:

    • Go to the Azure AD portal (https://aad.portal.azure.com/) or via M365 Admin Center (Groups > Active groups).

    • Create at least one group, e.g., “All Company Employees”. Assign all 20 users to this group. This makes targeting policies much easier. You might create pilot groups later for testing.

Phase 2: Basic Security Policies (Configuration Profiles)

Start with essential security settings for each platform. Target these profiles to your “All Company Employees” group (or a pilot group first).

  • How to Create: In Endpoint Manager (https://endpoint.microsoft.com/), go to Devices > Configuration profiles > Create profile. Select the Platform, then choose a Profile type (use Settings catalog where possible for granularity, or Templates for common scenarios).
  1. Windows Security Policies:

    • Platform: Windows 10 and later
    • Profile Type: Settings catalog
    • Key Settings to Configure (Search within Settings catalog):
      • BitLocker: Require device encryption, configure recovery key storage. (Crucial!)

      • Password: Set minimum length, complexity, history.

      • Windows Defender (Microsoft Defender Antivirus): Ensure real-time monitoring, cloud protection, daily scans are enabled. (M365 BP includes Defender for Business features here).

      • Windows Update for Business: Create Update Rings to manage patch deployment (e.g., install deadlines, deferral periods).

      • Firewall: Ensure Microsoft Defender Firewall is enabled for relevant profiles (Domain, Private, Public).
  2. macOS Security Policies:

    • Platform: macOS
    • Profile Type: Settings catalog (preferred) or Templates (e.g., Device Restrictions)

    • Key Settings:
      • Passcode: Set minimum length, complexity, auto-lock time.

      • Encryption (FileVault): Require FileVault disk encryption, configure recovery key escrow. (Crucial!)

      • Software Update Policy: Configure how updates are handled.

      • Security & Privacy: Enforce Gatekeeper (allow apps from App Store and identified developers), ensure Firewall is enabled.
  3. iOS/iPadOS Security Policies:

    • Platform: iOS/iPadOS
    • Profile Type: Settings catalog (preferred) or Templates (e.g., Device Restrictions)

    • Key Settings:
      • Passcode: Require passcode, set minimum length, complexity (e.g., alphanumeric), maximum grace period for device lock, max failed attempts before wipe (optional but strong).

      • Device Restrictions: Consider disabling simple passcodes, maybe block untrusted TLS certificates, configure AirDrop settings. Start minimally.
  4. Android Enterprise (Work Profile) Security Policies:

    • Platform: Android Enterprise
    • Profile Type: Personally-owned work profile > Device restrictions
    • Key Settings:
      • Work profile settings: Require a separate Work Profile Password (complexity, length).

      • Device password: Require a device screen lock (can be less strict than work profile if desired, but still recommended).

      • Security: Ensure work profile data is encrypted (usually default), block screen capture within the work profile, potentially restrict data sharing between personal/work profiles.

Phase 3: Protect App Data (Application Protection Policies – MAM)

This is vital for BYOD scenarios and adds a layer of security even on enrolled devices.

  • How to Create: In Endpoint Manager, go to Apps > App protection policies > Create policy. Select the platform (iOS/iPadOS, Android, Windows).
  1. Create Policies for iOS/iPadOS and Android:

    • Target these policies to your “All Company Employees” group.

    • Apps: Select All Microsoft apps or target specific core apps initially (Outlook, OneDrive, Teams, Edge, Word, Excel, PowerPoint).

    • Data Protection Settings:
      • Prevent Save As to local/personal storage.

      • Restrict Cut, copy, and paste between policy-managed apps and unmanaged/personal apps (Allow within policy apps).

      • Block opening work data in unmanaged apps.

      • Encrypt work app data.
    • Access Requirements:
      • Require PIN for access (separate from device passcode). Set complexity, length, timeout. Allow Biometrics (Face ID/Touch ID/Fingerprint) as an alternative to PIN.
    • Conditional Launch:
      • Set conditions like minimum OS version, block jailbroken/rooted devices.
  2. (Optional but Recommended) Create Policy for Windows:

    • This protects data on Windows devices without full MDM enrollment (useful if some Windows PCs are personal).

    • Target the policy to the user group.

    • Select target apps (e.g., Edge).

    • Configure similar data protection settings (prevent save-as, restrict copy/paste).

    • Note: Windows MAM has fewer features than mobile MAM.

Phase 4: Enforce Health and Access (Compliance & Conditional Access)

This ties everything together.

  1. Create Device Compliance Policies:

    • How to Create: In Endpoint Manager, go to Devices > Compliance policies > Create policy. Select Platform.

    • Key Settings (Align with Configuration Profiles):
      • Windows: Require BitLocker, Require Secure Boot, Require Antivirus, Require Firewall, Set Min/Max OS Version, Require Password.

      • macOS: Require System Integrity Protection, Require Firewall, Require Password, Require FileVault, Set Min/Max OS Version.

      • iOS/iPadOS: Require Passcode, Require device encryption (implicit with passcode), Min/Max OS Version, Block Jailbroken devices.

      • Android Enterprise (Work Profile): Require Device Lock, Require Encryption, Min/Max OS Version, Block Rooted devices, Require Google Play Protect checks.
    • Actions for Non-Compliance: Start with Mark device noncompliant (immediately). You can add Send email to end user after a few days.

    • Assignment: Assign these policies to your “All Company Employees” group.
  2. Configure Foundational Conditional Access Policies:

    • How to Configure: In Endpoint Manager, go to Devices > Conditional Access > Create new policy. (This actually takes you to the Azure AD CA portal).

    • Policy 1: Require MFA for All Users:
      • Name: CA001: Require MFA for All Users
      • Assignments: Users and groups > Include All users. Exclude 1-2 emergency access/”break-glass” accounts (highly recommended).

      • Cloud apps or actions: Include All cloud apps.

      • Conditions: Define any trusted locations (like your office IP) where MFA might be skipped if necessary (use with caution).

      • Access controls: Grant > Grant access > Check Require multi-factor authentication. Require all the selected controls.

      • Enable policy: On (or Report-only initially to test impact).
    • Policy 2: Require Compliant Devices for Cloud App Access:
      • Name: CA002: Require Compliant Device for Access
      • Assignments: Users and groups > Include All users. Exclude break-glass accounts.

      • Cloud apps or actions: Include All cloud apps.

      • Conditions: Device platforms > Configure > Include All platforms. Client apps > Configure > Include Browser, Mobile apps and desktop clients.

      • Access controls: Grant > Grant access > Check Require device to be marked as compliant. Require all the selected controls.

      • Enable policy: Report-only first, then On.
    • Policy 3: Require Approved App / App Protection Policy for Mobile Access:
      • Name: CA003: Require Protected Apps on Mobile
      • Assignments: Users and groups > Include All users. Exclude break-glass accounts.

      • Cloud apps or actions: Include Office 365 (or specific apps like Exchange Online, SharePoint Online).

      • Conditions: Device platforms > Configure > Include Android, iOS. Client apps > Configure > Include Mobile apps and desktop clients.

      • Access controls: Grant > Check Require approved client app AND Require app protection policy. Select Require one of the selected controls (allows flexibility if one isn’t applicable).

      • Enable policy: Report-only first, then On.

Phase 5: User Enrollment, Communication & Monitoring

  1. Communicate with Users:

    • Explain why these changes are being made (security, data protection).

    • Provide simple instructions on how to enroll their devices (e.g., install Company Portal app from the app store and sign in).

    • Explain what they should expect (e.g., prompts for PINs, work profile creation on Android).

    • Offer support for the transition.
  2. Guide Users Through Enrollment:

    • Have users install the “Intune Company Portal” app on their iOS, Android, and macOS devices and sign in with their M365 credentials. Follow the prompts.

    • For Windows devices that are not already Azure AD Joined: Guide users through Settings > Accounts > Access work or school > Connect, entering their M365 email and following prompts to join Azure AD and enroll in Intune (if Automatic Enrollment is configured).
  3. Monitor Enrollment and Compliance:

    • In Endpoint Manager, check Devices > Overview for enrollment status and compliance overview.

    • Check specific device compliance under Devices > Compliance policies.

    • Review Conditional Access sign-in logs in Azure AD (Monitoring > Sign-in logs) to see policy impacts.

Important Considerations:

  • Start Simple & Iterate: Don’t try to implement everything at once. Start with foundational policies and build complexity as needed.

  • Test Thoroughly: Use pilot groups before rolling out to everyone. Use “Report-only” mode for Conditional Access policies initially.

  • BYOD vs. Corporate: Be clear about expectations for personal devices (Work Profile on Android, MAM policies) vs. company-owned devices (potentially fully managed).

  • User Experience: Balance security with usability. Overly restrictive policies can hinder productivity.

  • Documentation: Keep track of the policies you create and why.

  • Annual APNs Renewal: Don’t forget this! If it expires, you can’t manage Apple devices.

This step-by-step guide provides a solid starting point leveraging the security features within Microsoft 365 Business Premium. Remember to consult Microsoft’s official documentation for detailed configuration options as you proceed.

The Evolving Landscape of IT Security: Is a Multi-Vendor Approach Still the Gold Standard for Risk Reduction?

Screenshot 2025-05-01 145421

The long-held adage that relying on multiple vendors for IT security services is the best way to reduce risk is facing increasing scrutiny in today’s complex threat landscape. While the principle of not putting all your eggs in one basket still holds some weight, the practicalities and potential drawbacks of managing a diverse array of security solutions have led many organizations to reconsider this traditional approach.

Historically, the multi-vendor strategy offered distinct advantages. It allowed organizations to select “best-of-breed” solutions for specific security needs, leveraging specialized expertise from different providers. This could lead to a more robust defense in individual areas like firewalls, endpoint protection, or threat intelligence. Additionally, a multi-vendor approach could provide geographic coverage and adaptability, allowing businesses to tailor security solutions to different locations and evolving requirements.1 It was also seen as a way to avoid vendor lock-in and maintain negotiation leverage.2

However, the modern cybersecurity environment presents significant challenges that can undermine the effectiveness of a fragmented security infrastructure. Managing multiple vendor relationships, contracts, and disparate technologies can lead to considerable operational overhead, increased complexity, and potential security gaps due to a lack of seamless integration between solutions.3 This “tool sprawl” can strain limited IT resources, make it difficult to achieve comprehensive visibility across the network, and slow down threat detection and response efforts.4 Furthermore, inconsistencies in security policies and the accumulation of technical debt can increase overall risk rather than reduce it.

In response to these challenges, a strong trend towards cybersecurity vendor consolidation has emerged. Organizations are increasingly looking to streamline their security stacks by partnering with fewer vendors who can offer integrated platforms or a broader portfolio of security services.5 This approach aims to simplify management, reduce costs, improve interoperability, and enhance overall security posture through better correlation of threat intelligence and centralized control.6 Gartner, for instance, has highlighted vendor consolidation as a key trend, with a significant percentage of organizations actively pursuing it to improve security and operational efficiency.7

Alternative strategies gaining traction include leveraging managed security service providers (MSSPs) who can deliver integrated, multi-vendor solutions as a single service. This allows organizations to benefit from best-of-breed technologies without the burden of managing each vendor individually. The focus is shifting from simply having multiple vendors to having a cohesive and well-managed security ecosystem, regardless of the number of underlying providers.

While the idea of diversifying to avoid a single point of failure remains theoretically sound, the practical difficulties of managing a complex multi-vendor environment can introduce new forms of risk, such as misconfiguration, alert fatigue, and delayed incident response.8

Therefore, the adage that you need to have your IT security services provided by multiple vendors to reduce risk is no longer universally valid. While a carefully selected and integrated multi-vendor strategy can still be effective for some organizations, particularly those with very specific and advanced security needs, the prevailing trend and expert opinion lean towards consolidation and integrated platforms for improved manageability, visibility, and overall risk reduction in the face of increasingly sophisticated threats and operational complexities. The focus has shifted from the sheer number of vendors to the effectiveness of the integrated security program.