Richard is the Principal Consultant and Founder of Arcible. A specialist in cloud solutions using Microsoft Azure, Microsoft 365, Microsoft Teams, Enterprise Mobility, and more. Richard holds numerous Microsoft certifications for both cloud and on-premises technologies.

Away from Arcible, Richard loves being involved in Scouting and getting outdoors with nature. You can find Richard online on Twitter and LinkedIn.

Setting up a Profanity Filter in Microsoft 365

I’ll be honest and say that I’m known to be quite partial to dropping the favourite phrase of a certain well known celebrity chef but I also know there is a time and a place for it so why are we talking about a profanity filter?

At Arcible, our style is formal but fun: we do our work in a professional and courteous manner but we like to be light-hearted and friendly about the whole thing too. That means we don’t want to be seeing or using such words in our communications. In the Microsoft 365 suite, there are a number of ways that we can police this to make sure we stay true to our image and maintain our reputation.

Read more…

Time Management with the 50 Minute Meeting

I can put my hand up and say that I’ve been in this situation far more times than I would care to admit with time management. When you work in an office people acknowledge that it takes time to travel from one meeting room to another but when working remote, that time management notion seems to get lost.

Even when working from home or remotely elsewhere, people need time in between their meeting schedule to use the bathroom, have a drink, or any number of other reasons. In this post, we’ll take a look at the very simple setting we can enable in Outlook to help with the issue.

Read more…

Simplify Machine Builds with Windows Autopilot

I’ve worked with Microsoft Configuration Manager since the 2007 version. I’ve seen and worked with many things relating to machine builds like creating Task Sequences, Operating System Images and keeping those images up-to-date, patched, and tested. Things have got much better since these early days, however, this is still IT-driven and requires extensive amounts of manual time-intensive testing and work.

By taking advantage of modern Windows 10 devices and management we can use cloud-based technologies to make the process slicker and even enable the serve themselves.

Read more…

Using Microsoft Teams Custom Backgrounds

Zoom Video has had the capability for virtual custom backgrounds for some time and it has been one of the hottest features requested for Microsoft Teams as a result. Microsoft Teams has had the ability to blur background for some time now and although it works very well, it isn’t quite as cool as a custom background.

Read more…

Restrict Team Creation in Microsoft Teams

By controlling permissions in Azure AD, we have the ability to restrict Team creation in Microsoft Teams. We don’t want to stop people collaborating: we just want to make sure they are doing it in the way that meets the meets of the business and any security and governance concerns we might have along the way.

In this article, we’ll talk about not just how to actually restrict the creation of Teams but the underlying thought process like why we would want to do it and what some of the different configurations might look like.

Read more…

Managing Windows 10 Updates using Microsoft Intune

Previously, we wrote about using Azure Update Management to perform Software Updates on Windows Server-based systems but what about Windows 10. In this article, we will explore Managing Windows 10 Updates using Microsoft Intune.

In on-premises environments, we use solutions like Windows Server Updates Services (WSUS), System Center Configuration Manager (SCCM), or Microsoft Endpoint Manager. Yes, you can continue to use SCCM and Endpoint Manager with their Cloud Attach Co-Management features, however, what about if you have a cloud-native environment? What about if you have an environment where users are using non-domain joined devices?

Read more…

Securing Passwords with Azure AD Password Protection

Organisations define password policies to ensure that their users are not setting weak passwords that can be easily compromised. In this article, we explore securing passwords with Azure AD Password Protection and whether it can help make you more secure but also easier on your users.

Traditional password policies in Active Directory rely on basic filters to determine the number of characters and type of characters including numbers, letters, and symbols. On face value these policies may seem secure, however, are these policies actually causing the problem and much weaker than you think?

Read more…

Manage Software Updates with Azure Update Management

The answer is Azure Update Management so what is the problem we are trying to solve? At Arcible, we have some on-premises servers. To keep safe, secure, and compliant, these servers need patching just like any other server does. Our environment is small and not big enough to justify a Microsoft Endpoint Manager (formerly Configuration Manager) deployment and Windows Server Updates Services (WSUS) is too painful and manual to manage.

So if we aren’t using Microsoft Endpoint Manager or WSUS, what do we do? We want a solution that’s automated to reduce the admin overhead but while being lightweight and not costing much.

Read more…

Is Your Physical Security Exposing Your Information Security

Last week I stumbled across a rather interesting set of videos on YouTube by a presenter called Deviant Ollam (https://www.youtube.com/results?search_query=deviant+ollam+physical+security). Deviant Ollam is a physical security penetration tester in the US and runs a company doing just that: trying to gain access to places he shouldn’t. We’re not talking black hat breaking in activity here but we are talking about white hat: doing these things paid for by the client to test their physical security.

What I found watching some of these videos was startling. Yes, some of the content is a little bit US-centric and perhaps doesn’t apply to the UK, however, it really got me thinking about a question. As IT, we spend all this time and money investing in information security, event logging, event monitoring, alerting, and more. If the physical security of our premises, however, is so easily bypassed, are we just making it too easy for would-be attackers.

Read more…