My colleague Dan has finally started his own blog about VMWare virtualisation products, and area he holds a lot of expertise in.
Check it out – PenguinPunk.net
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
My colleague Dan has finally started his own blog about VMWare virtualisation products, and area he holds a lot of expertise in.
Check it out – PenguinPunk.net

Understanding the set of registered and enterprise apps active in a Microsoft 365 tenant is important. Attackers can sneak in and plant an app to exfiltrate or otherwise steal data. This article explains how to use PowerShell to create a service principal analysis report that highlights common problems and gives tenant administrators the data needed to manage apps.

In this blog, we review Microsoft’s 2025 Digital Defense Report and highlight the trends you need to know. From a surge in ransomware targeting hybrid environments to identity-based attacks at record levels, the report makes one thing clear: resilience and strong identity protection are critical.

Managing devices across large organizations can be complex. Administrative Units (AUs) help scope admin rights, but what about newly registered devices? In this article, we explain how to automate adding devices to the correct AU using Microsoft Graph and Azure Automation runbooks with managed identities—eliminating manual steps and improving security.