This…

…does not compute with this…

Good one Apple.
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
This…

…does not compute with this…

Good one Apple.

In this blog, we review Microsoft’s 2025 Digital Defense Report and highlight the trends you need to know. From a surge in ransomware targeting hybrid environments to identity-based attacks at record levels, the report makes one thing clear: resilience and strong identity protection are critical.

Managing devices across large organizations can be complex. Administrative Units (AUs) help scope admin rights, but what about newly registered devices? In this article, we explain how to automate adding devices to the correct AU using Microsoft Graph and Azure Automation runbooks with managed identities—eliminating manual steps and improving security.

Utility accounts exist in every Microsoft 365 tenant. These accounts are not intended for normal user activity and include accounts used for Exchange room and shared mailboxes and the break-glass or emergency accounts intended to allow administrators to sign-in if their usual accounts are blocked. This article shows how to use PowerShell and the Microsoft Graph to check sign-in events to ensure that the accounts aren't being accessed.