<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>CIAOPS</title>
	<atom:link href="https://blog.ciaops.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.ciaops.com</link>
	<description>Information about SharePoint, Microsoft 365, Azure, Mobility and Productivity from the Computer Information Agency</description>
	<lastBuildDate>Fri, 08 May 2026 23:36:22 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>

<image>
	<url>https://blog.ciaops.com/wp-content/uploads/2019/02/favicon.jpg?w=16</url>
	<title>CIAOPS</title>
	<link>https://blog.ciaops.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">157894496</site><cloud domain='blog.ciaops.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<atom:link rel="search" type="application/opensearchdescription+xml" href="https://blog.ciaops.com/osd.xml" title="CIAOPS" />
	<atom:link rel='hub' href='https://blog.ciaops.com/?pushpress=hub'/>
	<item>
		<title>Shipping Intune App Protection Policies for BYOD: What Actually Works in Production</title>
		<link>https://blog.ciaops.com/2026/05/09/shipping-intune-app-protection-policies-for-byod-what-actually-works-in-production/</link>
					<comments>https://blog.ciaops.com/2026/05/09/shipping-intune-app-protection-policies-for-byod-what-actually-works-in-production/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Fri, 08 May 2026 23:35:00 +0000</pubDate>
				<category><![CDATA[Intune]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13215</guid>

					<description><![CDATA[App Protection Policies (APP, sometimes called MAM) are the single highest-ROI control in Business Premium for BYOD. You get corporate data containerisation on an unenrolled iPhone or Android device in about an afternoon — if you avoid the usual landmines. Here&#8217;s the pattern I ship to MSP clients. Prerequisites people miss APP only protects apps &#8230; <a href="https://blog.ciaops.com/2026/05/09/shipping-intune-app-protection-policies-for-byod-what-actually-works-in-production/" class="more-link">Continue reading <span class="screen-reader-text">Shipping Intune App Protection Policies for BYOD: What Actually Works in&#160;Production</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h3><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-73.png"><img width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-72.png?w=442&#038;h=294" border="0"></a></h3>
<p><font face="Verdana" size="3">App Protection Policies (APP, sometimes called MAM) are the single highest-ROI control in Business Premium for BYOD. You get corporate data containerisation on an unenrolled iPhone or Android device in about an afternoon — if you avoid the usual landmines. Here&#8217;s the pattern I ship to MSP clients.</font></p>
<h4><font face="Verdana" size="3">Prerequisites people miss</font></h4>
<p><font face="Verdana" size="3">APP only protects apps that implement the Intune App SDK (Outlook, Teams, Word, Edge, OneDrive, etc.). That&#8217;s most of M365, but not every third-party app the user loves. Before you touch a policy:</font></p>
<ul>
<li><font face="Verdana" size="3">Every targeted user must have an <strong>Intune Plan 1</strong> licence (bundled in Business Premium and the E3/E5 stack).<br />
</font></p>
<li><font face="Verdana"><font size="3"><strong>Company Portal</strong> must be installed on Android. iOS doesn&#8217;t strictly need it for MAM-WE (without enrolment), but Authenticator is required for sign-in brokering.<br />
</font></font></p>
<li><font face="Verdana" size="3">For Android, you need the <strong>Play Integrity verdict</strong> configured if you plan to block rooted devices — and Play Store access, which rules out many China-market devices.<br />
</font></p>
<li><font face="Verdana" size="3">Decide <em>now</em> whether you&#8217;ll pair APP with a Conditional Access grant of <strong>Require app protection policy</strong>. If yes, your CA policy needs to exclude break-glass accounts and any service accounts that hit Graph from mobile.</font></li>
</ul>
<p><font face="Verdana" size="3">See the </font><a href="https://learn.microsoft.com/en-us/intune/app-management/protection/overview"><font face="Verdana" size="3">App protection policies overview</font></a><font face="Verdana" size="3"> for the full support matrix.</font></p>
<h4><font face="Verdana" size="3">Where to configure</font></h4>
<p><font face="Verdana" size="3">Everything lives in the <strong>Microsoft Intune admin center</strong> at </font><a href="https://intune.microsoft.com/"><font face="Verdana" size="3">intune.microsoft.com</font></a><font face="Verdana" size="3">:</font></p>
<ul>
<li><font face="Verdana"><font size="3"><strong>Apps → App protection policies → Create policy</strong> → pick iOS/iPadOS or Android. You create one policy per platform.<br />
</font></font></p>
<li><font face="Verdana" size="3">Target apps: start with <strong>&#8220;Selected apps&#8221;</strong> and pick the core Microsoft apps. Do not start with &#8220;All Microsoft Apps&#8221; — you&#8217;ll regret it the first time Teams Rooms or a hybrid meeting app trips the policy.<br />
</font></p>
<li><font face="Verdana" size="3">Data protection settings: align with Microsoft&#8217;s </font><a href="https://learn.microsoft.com/en-us/intune/app-management/protection/create-policy"><font face="Verdana" size="3">Level 2 enterprise enhanced framework</font></a><font face="Verdana" size="3"> as your default. Level 1 is too loose for anyone storing client data; Level 3 breaks copy/paste workflows most SMBs rely on.<br />
</font></p>
<li><font face="Verdana" size="3">Access requirements: PIN of 6 digits, biometric allowed, 30-minute offline grace.<br />
</font></p>
<li><font face="Verdana" size="3">Conditional launch: jailbreak/root = Block access, min OS version = current−1, max PIN attempts = 5 → Wipe data. Full reference at </font><a href="https://learn.microsoft.com/en-us/intune/app-management/protection/configure-conditional-launch"><font face="Verdana" size="3">Conditional launch actions</font></a><font face="Verdana" size="3">.</font></li>
</ul>
<h4><font face="Verdana" size="3">The rollout pattern that actually works</font></h4>
<p><font face="Verdana" size="3">Three rings, two weeks each, no exceptions:</font></p>
<ol>
<li><font face="Verdana"><font size="3"><strong>Ring 0 — IT and champions (5–10 users).</strong> Assign to a dynamic security group. Set Conditional launch actions to <strong>Warn</strong>, not Block. Let it bake. You are looking for app conflicts, not policy correctness.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Ring 1 — Pilot department (25–50 users).</strong> Flip conditional launch to <strong>Block</strong>. Enable CA &#8220;require app protection policy&#8221; <strong>in report-only mode</strong>. Watch sign-in logs for a week — you will find the one user still using the native iOS Mail app.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Ring 2 — Everyone.</strong> Move CA to On. Decommission any &#8220;allow legacy auth&#8221; exceptions at the same time — clients will push back, hold the line.</font></font></li>
</ol>
<p><font face="Verdana" size="3">Use <strong>assignment filters</strong> (not separate groups) to carve out corporate-owned devices from BYOD rules. It scales; groups don&#8217;t.</font></p>
<h4><font face="Verdana" size="3">The three pitfalls that bite</font></h4>
<p><font face="Verdana"><font size="3"><strong>1. Policy conflicts silently pick the most restrictive value.</strong> If a user is in two groups with different PIN lengths, they get the longer one — and no error surfaces. Run one policy per platform per persona. Document which group wins.</font></font></p>
<p><font face="Verdana"><font size="3"><strong>2. Selective wipe isn&#8217;t device wipe.</strong> </font></font><a href="https://learn.microsoft.com/en-us/intune/intune-service/apps/apps-selective-wipe"><font face="Verdana" size="3">Apps → App selective wipe</font></a><font face="Verdana" size="3"> removes corporate data from managed apps only — photos, personal iMessages, the user&#8217;s Spotify library all stay. Train your service desk to say this out loud when an employee leaves. Also: the wipe only fires the next time the user opens the app, and can take 30 minutes.</font></p>
<p><font face="Verdana"><font size="3"><strong>3. Conditional launch &#8220;Min OS version&#8221; will brick users overnight.</strong> When Apple ships iOS 19 and you&#8217;ve set &#8220;Min OS version = 18&#8221;, a user on 17 walks in on Monday and can&#8217;t open Outlook. Always pair Min OS version with a <strong>Warn</strong> action first, run it for a fortnight, then escalate to Block.</font></font></p>
<p><font face="Verdana" size="3">Get these three right and APP is genuinely boring — which, for mobile security, is exactly what you want.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/09/shipping-intune-app-protection-policies-for-byod-what-actually-works-in-production/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13215</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-72.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>CIA Brief 20260509</title>
		<link>https://blog.ciaops.com/2026/05/09/cia-brief-20260509/</link>
					<comments>https://blog.ciaops.com/2026/05/09/cia-brief-20260509/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Fri, 08 May 2026 23:34:58 +0000</pubDate>
				<category><![CDATA[CIA Brief]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13398</guid>

					<description><![CDATA[Here&#8217;s a summary of the 10 stories posted in the Patrons News channel over the last 7 days, grouped by topic. Security &#38; Threat Intelligence SOHO router compromise leads to DNS hijacking and AiTM attacks — Microsoft Threat Intelligence reports that Russian military-linked actor Forest Blizzard (sub-group Storm-2754) has compromised insecure home/small-office routers, redirecting DNS &#8230; <a href="https://blog.ciaops.com/2026/05/09/cia-brief-20260509/" class="more-link">Continue reading <span class="screen-reader-text">CIA Brief 20260509</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><font face="Verdana" size="3"><img alt="image" src="https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-1.png?w=220&amp;h=220"></font></p>
<p><font face="Verdana" size="3">Here&#8217;s a summary of the 10 stories posted in the Patrons <strong>News</strong> channel over the last 7 days, grouped by topic.</font></p>
<h4><font face="Verdana" size="3">Security &amp; Threat Intelligence</font></h4>
<ul>
<li>
<p><font face="Verdana"><font size="3"><strong>SOHO router compromise leads to DNS hijacking and AiTM attacks</strong> — Microsoft Threat Intelligence reports that Russian military-linked actor Forest Blizzard (sub-group Storm-2754) has compromised insecure home/small-office routers, redirecting DNS to attacker-controlled infrastructure to enable adversary-in-the-middle attacks against Outlook on the web. Over 200 organisations and 5,000 consumer devices have been impacted since August 2025. </font></font><a href="https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/"><font face="Verdana" size="3">https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/</font></a></p>
<li>
<p><font face="Verdana"><font size="3"><strong>ClickFix campaign uses fake macOS utilities to deliver infostealers</strong> — Threat actors are posting fake macOS troubleshooting guides on Medium, Squarespace and Craft pages instructing users to paste Terminal commands that install Macsync, Shub Stealer or AMOS infostealers, which exfiltrate Keychain entries, iCloud data and crypto wallet keys (and sometimes replace Ledger, Trezor and Exodus apps with trojanised versions). </font></font><a href="https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/"><font face="Verdana" size="3">https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/</font></a></p>
<li>
<p><font face="Verdana"><font size="3"><strong>Multi-stage &#8216;code of conduct&#8217; phishing leads to AiTM token compromise</strong> — A large credential-theft campaign (April 14–16) targeted ~35,000 users across 13,000 organisations in 26 countries, mostly US, using polished &#8220;internal regulatory&#8221; emails with PDF attachments. The chain ran through CAPTCHAs and staging pages before hitting an AiTM Microsoft sign-in flow that captures auth tokens. </font></font><a href="https://www.microsoft.com/en-us/security/blog/2026/05/04/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise/"><font face="Verdana" size="3">https://www.microsoft.com/en-us/security/blog/2026/05/04/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise/</font></a></p>
</li>
</ul>
<h4><font face="Verdana" size="3">Microsoft 365 Product Updates</font></h4>
<ul>
<li>
<p><font face="Verdana"><font size="3"><strong>What&#8217;s new in Microsoft Teams – April 2026</strong> — Headline features include Copilot call delegation, Interpreter agent enhancements (consecutive interpretation, sign-language attribution), targeted messages from agents, sensitivity-label inheritance for recordings and Loop notes, an External Domains Anomalies Report, and Teams Phone user multi-line (up to 10 numbers per user). </font></font><a href="https://techcommunity.microsoft.com/blog/microsoftteamsblog/whats-new-in-microsoft-teams--april-2026/4515907"><font face="Verdana" size="3">https://techcommunity.microsoft.com/blog/microsoftteamsblog/whats-new-in-microsoft-teams&#8211;april-2026/4515907</font></a></p>
<li>
<p><font face="Verdana"><font size="3"><strong>Microsoft 365 E7 and Agent 365 are now generally available</strong> — Microsoft&#8217;s new top-tier M365 SKU and the Agent 365 platform have moved to general availability (announced 1 May 2026). </font></font><a href="https://techcommunity.microsoft.com/blog/microsoft_365blog/microsoft-365-e7-and-agent-365-are-now-generally-available/4516295"><font face="Verdana" size="3">https://techcommunity.microsoft.com/blog/microsoft_365blog/microsoft-365-e7-and-agent-365-are-now-generally-available/4516295</font></a></p>
<li>
<p><font face="Verdana"><font size="3"><strong>Get more out of Microsoft Clipchamp with these little-known features</strong> — A walk-through of Brand kits for consistent logos/colours/fonts, fade and blur transitions, automatic captions, aspect-ratio presets for repurposing content, and built-in stock search — plus Copilot in the Clipchamp video hub for searchable, summarised playback. </font></font><a href="https://techcommunity.microsoft.com/blog/microsoft365insiderblog/get-more-out-of-microsoft-clipchamp-with-these-little%E2%80%91known-features/4514855"><font face="Verdana" size="3">https://techcommunity.microsoft.com/blog/microsoft365insiderblog/get-more-out-of-microsoft-clipchamp-with-these-little%E2%80%91known-features/4514855</font></a></p>
</li>
</ul>
<h4><font face="Verdana" size="3">Identity, Security &amp; SIEM Platform</font></h4>
<ul>
<li>
<p><font face="Verdana"><font size="3"><strong>Lock down AI, web and private apps – what&#8217;s new in Internet Access and Private Access</strong> — Updates to Microsoft Entra&#8217;s Global Secure Access covering tighter controls for AI traffic, web and private application access. </font></font><a href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/lock-down-ai-web-and-private-apps-what%E2%80%99s-new-in-internet-access-and-private-acce/3847825"><font face="Verdana" size="3">https://techcommunity.microsoft.com/blog/microsoft-entra-blog/lock-down-ai-web-and-private-apps-what%E2%80%99s-new-in-internet-access-and-private-acce/3847825</font></a></p>
<li>
<p><font face="Verdana"><font size="3"><strong>What&#8217;s new in Microsoft Sentinel – April 2026</strong> — RSAC-aligned updates including OSINT reports inside Threat Analytics, hard cost-limit enforcement for KQL queries and notebooks, new connectors (CrowdStrike, Imperva Cloud WAF, AWS ELB, rebuilt Logstash output plugin), Sentinel data federation, custom graphs, MCP entity analyzer GA and a Claude MCP connector. </font></font><a href="https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/what%E2%80%99s-new-in-microsoft-sentinel-april-2026/4516354"><font face="Verdana" size="3">https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/what%E2%80%99s-new-in-microsoft-sentinel-april-2026/4516354</font></a></p>
</li>
</ul>
<h4><font face="Verdana" size="3">CIAOPS Content</font></h4>
<ul>
<li><font face="Verdana"><font size="3"><strong>CIA Brief 20260502</strong> — Robert&#8217;s weekly roundup of Microsoft 365, Copilot, AI and security news for the week ending 2 May 2026, covering items including the M365 E7 / Agent 365 GA announcement. </font></font><a href="https://blog.ciaops.com/2026/05/02/cia-brief-20260502/"><font face="Verdana" size="3">https://blog.ciaops.com/2026/05/02/cia-brief-20260502/</font></a></li>
</ul>
<h4><font face="Verdana" size="3">Archive / Reference</font></h4>
<ul>
<li><font face="Verdana"><font size="3"><strong>The Future of SharePoint</strong> (2016 post) — Jeff Teper&#8217;s original &#8220;Future of SharePoint&#8221; announcement from May 2016, unveiling the cloud-first, mobile-first SharePoint vision, modern team sites, the SharePoint mobile app and the SharePoint Framework. Reposted to the channel for reference. </font></font><a href="https://www.microsoft.com/en-us/microsoft-365/blog/2016/05/04/the-future-of-sharepoint/"><font face="Verdana" size="3">https://www.microsoft.com/en-us/microsoft-365/blog/2016/05/04/the-future-of-sharepoint/</font></a></li>
</ul>
<p><u><em><font face="Verdana" size="3">After hours</font></em></u></p>
<p><font face="Verdana"><font size="3">Why Would Anyone Live in NYC? – </font><a title="https://www.youtube.com/watch?v=POg3_b9txwM" href="https://www.youtube.com/watch?v=POg3_b9txwM"><font size="3">https://www.youtube.com/watch?v=POg3_b9txwM</font></a></font></p>
<p><em><u><font face="Verdana" size="3">Editorial</font></u></em></p>
<p><font face="Verdana" size="3">If you found this valuable, the I’d appreciate a ‘like’ or perhaps a </font><a href="https://ko-fi.com/ciaops"><font face="Verdana" size="3">donation</font></a><font face="Verdana" size="3"> at </font><a href="https://ko-fi.com/ciaops"><font face="Verdana" size="3">https://ko-fi.com/ciaops</font></a><font face="Verdana" size="3">. This helps me know that people enjoy what I have created and provides resources to allow me to create more content. If you have any feedback or suggestions around this, I’m all ears. You can also find me via email </font><a><font face="Verdana" size="3">director@ciaops.com</font></a><font face="Verdana" size="3"> and on X (Twitter) at </font><a href="https://www.twitter.com/directorcia"><font face="Verdana" size="3">https://www.twitter.com/directorcia</font></a><font face="Verdana" size="3">.</font></p>
<p><font face="Verdana" size="3">If you want to be part of a dedicated Microsoft Cloud community with information and interactions daily, then consider becoming a CIAOPS Patron – </font><a href="http://www.ciaopspatron.com/"><font face="Verdana" size="3">www.ciaopspatron.com</font></a><font face="Verdana" size="3">.</font></p>
<p><font face="Verdana" size="3">Watch out for the next </font><a href="https://blog.ciaops.com/category/cia-brief/"><font face="Verdana" size="3">CIA Brief</font></a><font face="Verdana" size="3"> next week</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/09/cia-brief-20260509/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13398</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-1.png?w=220&#038;h=220" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>The Market Has Shifted. MSPs Need to Catch Up.</title>
		<link>https://blog.ciaops.com/2026/05/09/the-market-has-shifted-msps-need-to-catch-up/</link>
					<comments>https://blog.ciaops.com/2026/05/09/the-market-has-shifted-msps-need-to-catch-up/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Fri, 08 May 2026 21:01:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[Sales]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13039</guid>

					<description><![CDATA[I’m seeing the same pattern play out across MSPs right now, and it has nothing to do with margin, tools, or ticket volume. It’s about how buying decisions are made. We’ve quietly moved from a world where MSPs convinced prospects on sales calls to one where high‑agency buyers largely decide before they speak to anyone. &#8230; <a href="https://blog.ciaops.com/2026/05/09/the-market-has-shifted-msps-need-to-catch-up/" class="more-link">Continue reading <span class="screen-reader-text">The Market Has Shifted. MSPs Need to Catch&#160;Up.</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h4><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-32.png"><img width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-32.png?w=442&#038;h=294" border="0"></a></h4>
<p><font face="Verdana" size="3">I’m seeing the same pattern play out across MSPs right now, and it has nothing to do with margin, tools, or ticket volume.</font></p>
<p><font face="Verdana" size="3">It’s about how buying decisions are made.</font></p>
<p><font face="Verdana" size="3">We’ve quietly moved from a world where MSPs <em>convinced</em> prospects on sales calls to one where high‑agency buyers largely decide <em>before</em> they speak to anyone. By the time they reach out, they’re validating a decision, not asking to be persuaded.</font></p>
<p><font face="Verdana" size="3">That shift is why sales calls are feeling harder, longer, and more expensive every quarter. And it’s why the way we position Microsoft 365 Copilot matters far more than most MSPs realise.</font></p>
<h5><font face="Verdana" size="3">Your Buyer Has Already Done the Thinking</font></h5>
<p><font face="Verdana" size="3">The SMB leaders I talk to aren’t confused anymore. They’re overloaded—but informed.</font></p>
<p><font face="Verdana" size="3">They’ve watched demos. They’ve tried tools. They’ve seen AI generate documents, answers, and summaries in seconds. What they’re struggling with isn’t <em>capability</em>, it’s <em>judgement</em>.</font></p>
<p><font face="Verdana" size="3">They want to know:</font></p>
<ul>
<li><font face="Verdana" size="3">What does this actually change about how my team works?<br />
</font></p>
<li><font face="Verdana" size="3">Where does it save thinking time, not just typing time?<br />
</font></p>
<li><font face="Verdana" size="3">What’s safe, sustainable, and embedded into existing workflows? </font></li>
</ul>
<p><font face="Verdana" size="3">This is where Copilot quietly wins—and where most MSPs fail to explain it.</font></p>
<p><font face="Verdana" size="3">Too many conversations still focus on features, licensing, or “AI add‑ons”. That framing belongs to the old market. The new one cares about outcomes and confidence.</font></p>
<h5><font face="Verdana" size="3">Copilot Changes How Work Happens—Not Just How Fast</font></h5>
<p><font face="Verdana" size="3">What I’m seeing with Microsoft 365 Copilot isn’t magic. It’s leverage.</font></p>
<p><font face="Verdana" size="3">Used properly, Copilot stops work from fragmenting across tools, prompts, and half‑finished ideas. It keeps thinking inside the systems people already live in—Outlook, Teams, Word, meetings, files.</font></p>
<p><font face="Verdana" size="3">For example, instead of staff chasing context across emails, notes, and chat threads, Copilot helps them reconstruct <em>why</em> a decision was made. Instead of rewriting the same update five times, people start with a structured draft that reflects real business language—not generic AI fluff.</font></p>
<p><font face="Verdana" size="3">The biggest shift isn’t productivity. It’s cognitive load.</font></p>
<p><font face="Verdana" size="3">When people spend less time searching, summarising, and re‑explaining, decision quality improves. That’s the kind of value SMB leaders notice quickly—even if they don’t use that language.</font></p>
<h5><font face="Verdana" size="3">Why MSP Sales Models Are Breaking</font></h5>
<p><font face="Verdana" size="3">Here’s the uncomfortable truth: MSPs who rely on long sales calls to educate prospects are already behind.</font></p>
<p><font face="Verdana" size="3">High‑agency buyers don’t want to be taught basics in a call. They want clarity <em>before</em> the call. They want to self‑qualify, explore scenarios, and understand implications on their own terms.</font></p>
<p><font face="Verdana" size="3">Copilot fits this shift perfectly—but only if MSPs stop treating it like “another product to sell” and start positioning it as an operational upgrade.</font></p>
<p><font face="Verdana" size="3">Your role isn’t to demo buttons. It’s to help clients:</font></p>
<ul>
<li><font face="Verdana" size="3">decide where Copilot <em>shouldn’t</em> be used yet<br />
</font></p>
<li><font face="Verdana" size="3">align it with real workflows<br />
</font></p>
<li><font face="Verdana" size="3">reduce risk while increasing confidence </font></li>
</ul>
<p><font face="Verdana" size="3">That advisory role builds trust long before a proposal is signed.</font></p>
<h5><font face="Verdana" size="3">The MSPs That Will Win</font></h5>
<p><font face="Verdana" size="3">The MSPs pulling ahead aren’t louder or cheaper. They’re clearer.</font></p>
<p><font face="Verdana" size="3">They create content that helps clients think. They show how Copilot actually fits into meetings, reporting, and daily decision‑making. They let buyers arrive informed—and ready.</font></p>
<p><font face="Verdana" size="3">The market isn’t asking MSPs to sell harder. It’s asking them to lead better.</font></p>
<p><font face="Verdana" size="3">Copilot isn’t the story. The shift in how decisions are made is.</font></p>
<p><font face="Verdana" size="3">If your sales pipeline feels heavier than it used to, that’s not a closing problem. It’s a positioning one.</font></p>
<p><font face="Verdana" size="3">And it’s fixable—if you meet your buyers where they already are.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/09/the-market-has-shifted-msps-need-to-catch-up/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13039</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-32.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>Self-Service Password Reset with writeback: the rollout that doesn&#8217;t burn your helpdesk</title>
		<link>https://blog.ciaops.com/2026/05/08/self-service-password-reset-with-writeback-the-rollout-that-doesnt-burn-your-helpdesk/</link>
					<comments>https://blog.ciaops.com/2026/05/08/self-service-password-reset-with-writeback-the-rollout-that-doesnt-burn-your-helpdesk/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Thu, 07 May 2026 23:34:00 +0000</pubDate>
				<category><![CDATA[Intune]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13211</guid>

					<description><![CDATA[SSPR is a box most MSPs tick on day one of a Business Premium tenant and then never look at again. That&#8217;s fine until a hybrid customer calls because Karen changed her password on My Sign-Ins, logged into her domain-joined laptop, and got rejected. SSPR without writeback is half a feature. Here&#8217;s how to deploy &#8230; <a href="https://blog.ciaops.com/2026/05/08/self-service-password-reset-with-writeback-the-rollout-that-doesnt-burn-your-helpdesk/" class="more-link">Continue reading <span class="screen-reader-text">Self-Service Password Reset with writeback: the rollout that doesn&#8217;t burn your&#160;helpdesk</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h3><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-72.png"><img width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-71.png?w=442&#038;h=294" border="0"></a></h3>
<p><font face="Verdana" size="3">SSPR is a box most MSPs tick on day one of a Business Premium tenant and then never look at again. That&#8217;s fine until a hybrid customer calls because Karen changed her password on My Sign-Ins, logged into her domain-joined laptop, and got rejected. SSPR without writeback is half a feature. Here&#8217;s how to deploy the whole thing properly.</font></p>
<h4><font face="Verdana" size="3">Prerequisites people miss</font></h4>
<p><font face="Verdana" size="3">The obvious ones — an Entra ID P1 license (included in Business Premium) and either <strong>Entra Connect Sync</strong> or <strong>Entra Connect Cloud Sync</strong> — aren&#8217;t where rollouts die. The misses are:</font></p>
<ul>
<li><font face="Verdana"><font size="3"><strong>On-prem AD permissions for the sync account.</strong> The account running Connect (or the Cloud Sync provisioning agent) needs <em>Reset password</em>, <em>Change password</em>, <em>Write lockoutTime</em>, and <em>Write pwdLastSet</em> on the user OUs. The Connect wizard grants these if you let it; locked-down AD environments often don&#8217;t. Writeback fails silently if these are missing.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>A matching on-prem password policy.</strong> Entra enforces its own complexity rules. If your on-prem policy is stricter (minimum length, history, banned words), a user&#8217;s new cloud password will be rejected by AD when it writes back, and the user will see a generic error. Align them before you enable, not after.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Combined registration actually enabled and enforced.</strong> Legacy SSPR-only registration still exists in old tenants. If users register methods for MFA but not SSPR, the reset flow blocks them.</font></font></li>
</ul>
<p><font face="Verdana" size="3">See Microsoft&#8217;s writeback concept doc for the full supported-operations list: </font><a href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-sspr-writeback"><font face="Verdana" size="3">https://learn.microsoft.com/en-us/entra/identity/authentication/concept-sspr-writeback(opens in new window)</font></a><font face="Verdana" size="3">.</font></p>
<h4><font face="Verdana" size="3">Where to configure it</font></h4>
<p><font face="Verdana" size="3">Everything is in the <strong>Entra admin centre</strong> — no PowerShell required for a standard deploy.</font></p>
<ul>
<li><font face="Verdana"><font size="3"><strong>Protection → Password reset → Properties</strong> to scope SSPR to a pilot group, then all users.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Protection → Password reset → Authentication methods</strong> to require two methods and pick which ones (drop SMS, keep Authenticator + email, add Questions only if you must).<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Protection → Password reset → On-premises integration</strong> to flip writeback on. If you&#8217;re using Cloud Sync, enable it in the provisioning agent config per the tutorial: </font></font><a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-cloud-sync-sspr-writeback"><font face="Verdana" size="3">https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-cloud-sync-sspr-writeback(opens in new window)</font></a><font face="Verdana" size="3">.<br />
</font></p>
<li><font face="Verdana"><font size="3"><strong>Protection → Authentication methods → Registration campaign</strong> to nudge users into combined registration: </font></font><a href="https://learn.microsoft.com/en-us/entra/identity/authentication/howto-registration-mfa-sspr-combined"><font face="Verdana" size="3">https://learn.microsoft.com/en-us/entra/identity/authentication/howto-registration-mfa-sspr-combined(opens in new window)</font></a><font face="Verdana" size="3">.</font></li>
</ul>
<h4><font face="Verdana" size="3">The rollout pattern that works</font></h4>
<p><font face="Verdana" size="3">Don&#8217;t flip it on tenant-wide. The pattern that doesn&#8217;t generate tickets:</font></p>
<ol>
<li><font face="Verdana"><font size="3"><strong>Pilot group of ~10 — IT plus two friendly business users.</strong> Scope SSPR to that group only. Verify a reset from My Sign-Ins actually lands in AD (<code>pwdLastSet</code> on the DC is your proof).<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Registration campaign to the pilot for 14 days.</strong> Force them through combined registration. Watch the Registration report for stragglers.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Broaden by department</strong>, not by &#8220;All users.&#8221; Finance first, then ops, then field staff. Each wave gets the campaign a week before the SSPR scope flips.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Protect the registration step with Conditional Access.</strong> Use <em>Register security information</em> as the user action and require MFA (or a Temporary Access Pass for new starters): </font></font><a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-all-users-security-info-registration"><font face="Verdana" size="3">https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-all-users-security-info-registration(opens in new window)</font></a><font face="Verdana" size="3">. Without this, an attacker who phishes a password can register their own MFA method and own the account.</font></li>
</ol>
<h4><font face="Verdana" size="3">Top pitfalls</font></h4>
<ol>
<li><font face="Verdana"><font size="3"><strong>Admins can&#8217;t use SSPR the same way users can.</strong> Privileged roles are locked to strong methods and can&#8217;t rely on Security Questions. Test with an admin-tier account <em>before</em> you cut over — and keep a break-glass account that is explicitly excluded from the CA registration policy.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Writeback &#8220;works&#8221; but the user still can&#8217;t log in.</strong> Nine times out of ten this is cached credentials on a domain-joined laptop that hasn&#8217;t seen a DC since the reset. Tell the user to connect to the corporate network or VPN and lock/unlock. Bake this into your helpdesk script.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Cloud Sync vs Connect Sync confusion.</strong> You can run them side-by-side, but writeback must be enabled on whichever one syncs that user&#8217;s domain. Audit first — we&#8217;ve seen tenants with both running where writeback was enabled on the wrong one and nobody noticed until a reset failed.</font></font></li>
</ol>
<p><font face="Verdana" size="3">Enable it properly once, and SSPR moves from a compliance checkbox to a real helpdesk-deflection tool.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/08/self-service-password-reset-with-writeback-the-rollout-that-doesnt-burn-your-helpdesk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13211</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-71.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>A Cleaner Way to Connect PowerShell to Exchange Online</title>
		<link>https://blog.ciaops.com/2026/05/08/a-cleaner-way-to-connect-powershell-to-exchange-online/</link>
					<comments>https://blog.ciaops.com/2026/05/08/a-cleaner-way-to-connect-powershell-to-exchange-online/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Thu, 07 May 2026 22:58:00 +0000</pubDate>
				<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13356</guid>

					<description><![CDATA[If you still rely on Connect-ExchangeOnline with a username, password, and an MFA prompt, you already know the pain. Scripts break overnight. Scheduled tasks fail when a token expires. Service accounts get flagged by conditional access. And the moment someone enables MFA on the admin account you&#8217;ve been quietly using, your automation falls over. I&#8217;ve &#8230; <a href="https://blog.ciaops.com/2026/05/08/a-cleaner-way-to-connect-powershell-to-exchange-online/" class="more-link">Continue reading <span class="screen-reader-text">A Cleaner Way to Connect PowerShell to Exchange&#160;Online</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h3><a href="https://blog.ciaops.com/wp-content/uploads/2026/05/image-14.png"><img loading="lazy" width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/05/image_thumb-13.png?w=442&#038;h=294" border="0"></a></h3>
<p><font face="Verdana" size="3">If you still rely on <code>Connect-ExchangeOnline</code> with a username, password, and an MFA prompt, you already know the pain. Scripts break overnight. Scheduled tasks fail when a token expires. Service accounts get flagged by conditional access. And the moment someone enables MFA on the admin account you&#8217;ve been quietly using, your automation falls over.</font></p>
<p><font face="Verdana" size="3">I&#8217;ve been written a new script —</font></p>
<p><a title="https://github.com/directorcia/Office365/blob/master/o365-connect-exo-cert.ps1" href="https://github.com/directorcia/Office365/blob/master/o365-connect-exo-cert.ps1"><font face="Verdana" size="3">https://github.com/directorcia/Office365/blob/master/o365-connect-exo-cert.ps1</font></a></p>
<p><font face="Verdana" size="3">with full documentation here:</font></p>
<p><a title="https://github.com/directorcia/Office365/wiki/Connect-to-Exchange-Online-with-Certificates" href="https://github.com/directorcia/Office365/wiki/Connect-to-Exchange-Online-with-Certificates"><font face="Verdana" size="3">https://github.com/directorcia/Office365/wiki/Connect-to-Exchange-Online-with-Certificates</font></a></p>
<p><font face="Verdana" size="3">— that swaps all of that for certificate-based app authentication. There&#8217;s nothing exotic about the underlying approach; Microsoft has supported it for years. What&#8217;s been missing is a clean, one-shot way to set it up without spending an afternoon clicking through the Entra portal. That&#8217;s what this script gives me, and I think it earns its place in any MSP&#8217;s toolkit.<br />
</font></p>
<h4><font face="Verdana" size="3">What the Script Actually Does</font></h4>
<p><font face="Verdana" size="3">There are two modes, controlled by switches.</font></p>
<p><font face="Verdana"><font size="3"><code>-GenerateLocalCertificate</code> creates a self-signed RSA-2048 certificate in your current user&#8217;s certificate store, exports the public key as a <code>.cer</code> file, and optionally exports a password-protected <code>.pfx</code>. By default it&#8217;s valid for two years. That&#8217;s the local side of the handshake.</font></font></p>
<p><font face="Verdana"><font size="3"><code>-UseCertificateAuth</code> is the everyday mode. You tell it which tenant to connect to — or let it look up the details in a profile map file — and it signs into Exchange Online using that certificate. No password. No browser. No MFA dialog.</font></font></p>
<p><font face="Verdana" size="3">The clever bit is the third option: combining <code>-GenerateLocalCertificate</code> with <code>-ProvisionEntraApp -Tenant 'contoso.onmicrosoft.com'</code>. In a single run, the script will generate the local certificate, authenticate to Microsoft Graph via a device-code flow, create the Entra ID app registration if it doesn&#8217;t exist, upload the certificate, grant <code>Exchange.ManageAsApp</code> and <code>Application.Read.All</code> with admin consent, create the matching service principal, sign you into Exchange Online to add the app to the <strong>Organization Management</strong> role group, and save the tenant, app ID, and certificate thumbprint to a JSON profile file so future connections don&#8217;t need any of those parameters.</font></p>
<p><font face="Verdana" size="3">That&#8217;s a job that normally takes twenty minutes of clicking, copying GUIDs, and second-guessing whether the right role got assigned. The script does it in about ninety seconds.</font></p>
<h4><font face="Verdana" size="3">Getting Started</font></h4>
<p><font face="Verdana" size="3">If you&#8217;re new to certificate auth, the first run is the one that matters. Drop the script onto an admin machine, open PowerShell, and run:</font></p>
<pre><code><font face="Verdana" size="3">.\o365-connect-exo-cert.ps1 -GenerateLocalCertificate -ProvisionEntraApp -Tenant 'yourtenant.onmicrosoft.com'</font></code></pre>
<p><font face="Verdana" size="3">You&#8217;ll be prompted to sign in twice — once via device code for the Graph permissions (which if you use the –<code>copydevicecodetoclipboard</code>, option will put the required device code straight into the clipboard to paste into the request), then again with <code>Connect-ExchangeOnline</code> so the script can add the app to the role group. Both need a Global Admin account. After that, every future run is just:</font></p>
<pre><code><font face="Verdana" size="3">.\o365-connect-exo-cert.ps1 -UseCertificateAuth -Tenant 'yourtenant.onmicrosoft.com'</font></code></pre>
<p><font face="Verdana" size="3">No prompts. No browser. The script reads the tenant, app ID, and thumbprint from <em>o365-exo-cert-auth.json</em> (saved to parent directory), finds the certificate in your local store, builds a signed JWT, and you&#8217;re in. One caveat worth flagging: when you&#8217;ve just provisioned a brand-new app, give it fifteen to thirty minutes for role assignments to replicate before you try to connect. The script warns about this in its output, but it&#8217;s the single most common reason a fresh setup looks broken when it isn&#8217;t.</font></p>
<p><font face="Verdana" size="3">If you&#8217;re managing more than one tenant, the profile file is where this really earns its keep. Each provisioning run appends or updates an entry, so you can ask for a connection by <code>-ProfileName</code>, <code>-Tenant</code>, or <code>-Organization</code> and the script picks the right credentials. When several profiles match, it lists them and lets you choose.</font></p>
<h4><font face="Verdana" size="3">Why Certificates Beat Passwords</font></h4>
<p><font face="Verdana" size="3">The security argument is the easy one. A certificate&#8217;s private key never leaves the machine that generated it. Nothing crosses the wire that an attacker could intercept and replay. There&#8217;s no shared secret to rotate across a team, no admin password sitting in a vault that someone might extract, and no MFA bypass to engineer because the flow doesn&#8217;t involve a user account at all.</font></p>
<p><font face="Verdana" size="3">Permissions are scoped too. The app holds only <code>Exchange.ManageAsApp</code> and read-only access to application metadata. If the certificate is ever compromised, you remove the key credential from the app registration and the access is gone — no password reset required, no impact on any human admin account.</font></p>
<p><font face="Verdana" size="3">The script enforces TLS 1.2, refuses to assign RBAC if the EXO session has landed in the wrong tenant, warns when the certificate is within thirty days of expiry, and keeps the device-code value off the clipboard by default to avoid leaks on RDP or shared sessions. Small things, but they add up.</font></p>
<h4><font face="Verdana" size="3">Why It&#8217;s a Win for Automation</font></h4>
<p><font face="Verdana" size="3">Certificate auth is what makes unattended Exchange Online work actually unattended. A scheduled task running at 2 a.m. doesn&#8217;t have a human to click &#8220;Approve&#8221; on an MFA prompt. With this approach, you point Task Scheduler at the script with <code>-noprompt</code>, pass the tenant, and walk away.</font></p>
<p><font face="Verdana" size="3">For an MSP, that becomes a per-tenant capability rather than a per-admin one. One profile file, one shared script, separate certificates per tenant or per admin machine — and now mailbox audits, distribution group cleanup, shared mailbox provisioning, and any of the other recurring chores you keep meaning to automate can run on a timer instead of waiting for a quiet Friday afternoon. Pair it with a Power Automate flow or a daily Copilot summary in Teams, and you&#8217;ve got reporting that lands in front of the right people without anyone signing in.</font></p>
<h4><font face="Verdana" size="3">Where I&#8217;d Take It Next</font></h4>
<p><font face="Verdana" size="3">If you&#8217;ve never moved off interactive sign-in for Exchange Online, this is the path I&#8217;d take. Spend half an hour standing it up against a test tenant. Get comfortable with the profile file. Then start moving your scheduled work over, one job at a time. The shift from &#8220;who&#8217;s signing in?&#8221; to &#8220;which certificate is presenting itself?&#8221; is a quiet one, but once your automation stops breaking every time an admin&#8217;s MFA settings change, you won&#8217;t go back.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/08/a-cleaner-way-to-connect-powershell-to-exchange-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13356</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/05/image_thumb-13.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>Purpose Is Not a Strategy (And MSPs Are Paying the Price)</title>
		<link>https://blog.ciaops.com/2026/05/08/purpose-is-not-a-strategy-and-msps-are-paying-the-price/</link>
					<comments>https://blog.ciaops.com/2026/05/08/purpose-is-not-a-strategy-and-msps-are-paying-the-price/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Thu, 07 May 2026 21:15:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13027</guid>

					<description><![CDATA[You didn’t start your MSP just to make money. There was something more. A problem you wanted to solve. A frustration you saw in the market. A sense that “IT could be done better” for small businesses that kept being ignored or overcharged. That purpose matters. It still does. But here’s the uncomfortable truth many &#8230; <a href="https://blog.ciaops.com/2026/05/08/purpose-is-not-a-strategy-and-msps-are-paying-the-price/" class="more-link">Continue reading <span class="screen-reader-text">Purpose Is Not a Strategy (And MSPs Are Paying the&#160;Price)</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h4><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-30.png"><img loading="lazy" width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-30.png?w=442&#038;h=294" border="0"></a></h4>
<p><font face="Verdana" size="3">You didn’t start your MSP just to make money.</font></p>
<p><font face="Verdana" size="3">There was something more. A problem you wanted to solve. A frustration you saw in the market. A sense that “IT could be done better” for small businesses that kept being ignored or overcharged.</font></p>
<p><font face="Verdana" size="3">That purpose matters. It still does.</font></p>
<p><font face="Verdana" size="3">But here’s the uncomfortable truth many MSP owners don’t like admitting:</font></p>
<p><strong><font face="Verdana" size="3">Purpose without a plan is just a story you tell yourself.</font></strong></p>
<p><font face="Verdana" size="3">I see plenty of MSPs who care deeply about their clients, their staff, and “doing the right thing”… yet wonder why growth has stalled, margins are thin, and every year feels harder than the last.</font></p>
<p><font face="Verdana" size="3">Caring is not the problem. Lack of focus is.</font></p>
<p><font face="Verdana" size="3"></p>
<hr>
<p></font></p>
<h4><font face="Verdana" size="3">When Good Intentions Don’t Move the Needle</font></h4>
<p><font face="Verdana" size="3">Most MSPs I talk to aren’t lazy or incompetent. They’re overloaded.</font></p>
<p><font face="Verdana" size="3">They’re saying yes to every request, every new tool, every vendor promise, and every “quick opportunity” that pops up. Slowly, almost invisibly, their original purpose gets diluted by noise.</font></p>
<p><font face="Verdana" size="3">Here’s what that looks like in the real world:</font></p>
<ul>
<li><font face="Verdana" size="3">Offering ten different service bundles because “every client is different”<br />
</font></p>
<li><font face="Verdana" size="3">Chasing the latest security product while last year’s one is barely implemented<br />
</font></p>
<li><font face="Verdana" size="3">Talking about standardisation, but never enforcing it<br />
</font></p>
<li><font face="Verdana" size="3">Claiming to be “strategic” while the business runs on reactive tickets </font></li>
</ul>
<p><font face="Verdana" size="3">None of this is malicious. It’s what happens when there’s no clear plan anchoring decisions.</font></p>
<p><font face="Verdana" size="3">You <em>care</em> about security, but do you have a defined baseline every client must meet?</font></p>
<p><font face="Verdana" size="3">You <em>care</em> about client outcomes, but can you clearly articulate the outcomes you deliver repeatedly?</font></p>
<p><font face="Verdana" size="3">You <em>care</em> about your team, but is the business designed to support them—or exhaust them?</font></p>
<p><font face="Verdana" size="3"></p>
<hr>
<p></font></p>
<h4><font face="Verdana" size="3">Focus Is the Real Competitive Advantage</font></h4>
<p><font face="Verdana" size="3">In the SMB market, MSPs don’t win by being everything. They win by being <strong>consistent</strong>.</font></p>
<p><font face="Verdana" size="3">The MSPs making real progress right now aren’t necessarily smarter or bigger. They’ve simply decided what matters—and stopped apologising for it.</font></p>
<p><font face="Verdana" size="3">They draw clear lines:</font></p>
<ul>
<li><font face="Verdana" size="3">This is our core stack<br />
</font></p>
<li><font face="Verdana" size="3">These are our minimum standards<br />
</font></p>
<li><font face="Verdana" size="3">This is how we onboard, secure, and support clients<br />
</font></p>
<li><font face="Verdana" size="3">This is what we <em>don’t</em> do </font></li>
</ul>
<p><font face="Verdana" size="3">That focus creates momentum.</font></p>
<p><font face="Verdana" size="3">Technicians know what “done properly” looks like. Clients know what they’re buying. Sales conversations become simpler. Tool sprawl reduces. Security improves because execution improves.</font></p>
<p><font face="Verdana" size="3">Most importantly, energy stops leaking.</font></p>
<p><font face="Verdana" size="3">Every “yes” you don’t think through properly costs far more than the revenue it brings in.</font></p>
<p><font face="Verdana" size="3"></p>
<hr>
<p></font></p>
<h4><font face="Verdana" size="3">Turn Purpose Into Something That Actually Scales</font></h4>
<p><font face="Verdana" size="3">If your MSP purpose is more than a feel‑good origin story, it needs structure.</font></p>
<p><font face="Verdana" size="3">Ask yourself three hard questions:</font></p>
<ol>
<li><strong><font face="Verdana" size="3">What problem do we solve better than most MSPs our size?</font></strong>
<li><strong><font face="Verdana" size="3">What standards are we no longer willing to compromise on—even if it costs us a client?</font></strong>
<li><strong><font face="Verdana" size="3">What would we stop doing next quarter if we truly backed our own strategy?</font></strong></li>
</ol>
<p><font face="Verdana" size="3">None of these require new tools. They require leadership decisions.</font></p>
<p><font face="Verdana" size="3">Purpose is the <em>why</em>.<br />Planning is the <em>how</em>.<br />Discipline is the <em>difference</em>.</font></p>
<p><font face="Verdana" size="3"></p>
<hr>
<p></font></p>
<h4><font face="Verdana" size="3">The Real Takeaway</font></h4>
<p><font face="Verdana" size="3">You can care deeply and still stay stuck.</font></p>
<p><font face="Verdana" size="3">Progress doesn’t come from passion alone—it comes from choosing fewer things and doing them consistently well.</font></p>
<p><font face="Verdana" size="3">If your MSP feels busy but fragile, successful but stretched, it’s not because you’ve lost your purpose.</font></p>
<p><font face="Verdana" size="3">It’s because it’s time to turn that purpose into a plan you’re willing to defend.</font></p>
<p><font face="Verdana" size="3">Start there. Everything else gets easier once you do.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/08/purpose-is-not-a-strategy-and-msps-are-paying-the-price/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13027</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-30.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>Your Conditional Access Is Stuck in 2018</title>
		<link>https://blog.ciaops.com/2026/05/07/your-conditional-access-is-stuck-in-2018/</link>
					<comments>https://blog.ciaops.com/2026/05/07/your-conditional-access-is-stuck-in-2018/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Thu, 07 May 2026 12:38:56 +0000</pubDate>
				<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[CA]]></category>
		<category><![CDATA[EntraID]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13352</guid>

					<description><![CDATA[You get a phone call from a client one Sunday morning in February. One of their bookkeepers had clicked an invoice link the previous Friday afternoon, signed in like normal, and gone home for the weekend. By Monday, the attacker had set up an inbox rule, watched a fortnight of email traffic, and sent a &#8230; <a href="https://blog.ciaops.com/2026/05/07/your-conditional-access-is-stuck-in-2018/" class="more-link">Continue reading <span class="screen-reader-text">Your Conditional Access Is Stuck in&#160;2018</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h3><a href="https://blog.ciaops.com/wp-content/uploads/2026/05/image-13.png"><img loading="lazy" width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/05/image_thumb-12.png?w=442&#038;h=294" border="0"></a></h3>
<p><font face="Verdana" size="3">You get a phone call from a client one Sunday morning in February. One of their bookkeepers had clicked an invoice link the previous Friday afternoon, signed in like normal, and gone home for the weekend. By Monday, the attacker had set up an inbox rule, watched a fortnight of email traffic, and sent a payment-redirect note to a supplier — from the bookkeeper&#8217;s actual mailbox. Eighty thousand dollars walked out the door before anyone noticed the wire details had quietly changed.</font></p>
<p><font face="Verdana" size="3">The tenant had MFA enforced. It had a Conditional Access policy. It had cyber insurance, renewed in January on the strength of those two things. None of that mattered.</font></p>
<h4><font face="Verdana" size="3">The attack moved. The configuration didn&#8217;t.</font></h4>
<p><font face="Verdana" size="3">Adversary-in-the-middle phishing kits don&#8217;t try to beat the MFA prompt anymore. They wait for the user to complete it, then steal the session token and replay it from somewhere else. Microsoft&#8217;s threat intel team disclosed an April campaign that hit thirty-five thousand users across thirteen thousand organisations in twenty-six countries — a single month, a single operator. Every one of those users had MFA. None of them had session controls tuned to actually defend the session.</font></p>
<p><font face="Verdana" size="3">This is the bit MSPs need to sit with. Conditional Access in Entra was never built as an MFA tickbox. It is the session control surface — the place where you decide what a signed-in user can do, from where, on what device, for how long. The grant and session controls in that same blade — the ones most SMB tenants have never opened — are what break this attack. We have spent five years building a defence for 2018 and leaving it deployed in 2026.</font></p>
<h4><font face="Verdana" size="3">Four switches, all in the same blade</font></h4>
<p><font face="Verdana" size="3">There are four controls inside Conditional Access that meaningfully change the outcome of a token theft, and most Business Premium tenants pay for all of them and use none.</font></p>
<ul>
<li><font face="Verdana" size="3">Sign-In Frequency, set deliberately rather than left at its sliding ninety-day default, collapses the lifetime of a stolen token. Most tenants I look at have it set backwards — managed users get prompted constantly while unmanaged sessions ride for weeks. </font></li>
<li><font face="Verdana" size="3">Require-compliant-device on Exchange Online forces the attacker&#8217;s browser session to fail at the grant, not the prompt. </font></li>
<li><font face="Verdana" size="3">Phishing-resistant authentication strength — passkeys, FIDO2, Windows Hello — closes off the credential path to begin with. </font></li>
<li><font face="Verdana" size="3">Token Protection, even in report-only on Windows native apps, gives you the telemetry to spot a session being replayed from a country your user has never visited.</font></li>
</ul>
<p><font face="Verdana" size="3">None of this is theoretical. Microsoft auto-rolled Conditional Access into more than half a million tenants in late 2023 specifically because tenants were not configuring it themselves. That auto-rollout sets the floor. The four controls above sit above the floor, and they are the ones that change the renewal conversation with your insurer.</font></p>
<h4><font face="Verdana" size="3">The unit economics finally work</font></h4>
<p><font face="Verdana" size="3">The honest reason most MSPs haven&#8217;t retuned their CA baseline is that per-tenant identity work used to be uneconomic. That changed. With GDAP and Microsoft Lighthouse, an MSP can review CA policy, push report-only changes, and watch sign-in telemetry across every client tenant from one pane. Pair that with a Loop page or a Teams channel for your security pod and the review cadence stops being a heroics exercise.</font></p>
<p><font face="Verdana" size="3">The bookkeeper followed her training to the letter. What let her down was a tenant configured for the threat landscape we had four years ago. When the next breach lands in one of your tenants, it will not be the MFA prompt that failed. It will be the session controls nobody touched. That is where the work is now.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/07/your-conditional-access-is-stuck-in-2018/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13352</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/05/image_thumb-12.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>Windows Hello for Business: Pick Cloud Kerberos Trust and Move On</title>
		<link>https://blog.ciaops.com/2026/05/07/windows-hello-for-business-pick-cloud-kerberos-trust-and-move-on/</link>
					<comments>https://blog.ciaops.com/2026/05/07/windows-hello-for-business-pick-cloud-kerberos-trust-and-move-on/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Wed, 06 May 2026 23:19:00 +0000</pubDate>
				<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Hello for Business]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13207</guid>

					<description><![CDATA[Every few weeks I get a question from an MSP engineer that starts with some version of &#8220;we&#8217;re about to roll out Windows Hello for Business — key trust or cloud trust?&#8221; My answer has been the same for a couple of years now, but the question keeps coming because the documentation is sprawling and &#8230; <a href="https://blog.ciaops.com/2026/05/07/windows-hello-for-business-pick-cloud-kerberos-trust-and-move-on/" class="more-link">Continue reading <span class="screen-reader-text">Windows Hello for Business: Pick Cloud Kerberos Trust and Move&#160;On</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h3><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-71.png"><img loading="lazy" width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-70.png?w=442&#038;h=294" border="0"></a></h3>
<p><font face="Verdana" size="3">Every few weeks I get a question from an MSP engineer that starts with some version of &#8220;we&#8217;re about to roll out Windows Hello for Business — key trust or cloud trust?&#8221; My answer has been the same for a couple of years now, but the question keeps coming because the documentation is sprawling and the old hybrid PKI diagrams still haunt everyone who deployed WHfB before 2022. If you have a hybrid Active Directory and a Business Premium tenant, you should be on cloud Kerberos trust. Full stop. Everything else is legacy baggage.</font></p>
<h4><font face="Verdana" size="3">The prerequisites people still miss</font></h4>
<p><font face="Verdana" size="3">Microsoft&#8217;s own </font><a href="https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/deploy/"><font face="Verdana" size="3">planning guide</font></a><font face="Verdana" size="3"> is the source of truth, but two prereqs catch MSPs out every time.</font></p>
<p><font face="Verdana" size="3">First, domain controllers. Cloud Kerberos trust needs Windows Server 2016 or later DCs, fully patched, and you need enough read-write DCs in every AD site where users will authenticate. If your branch office has one creaky 2012 R2 box left, the sign-in will fail in ways that look like network issues and waste a day of your life.</font></p>
<p><font face="Verdana" size="3">Second, Microsoft Entra Kerberos has to be explicitly enabled against the on-prem domain. It&#8217;s not on by default. Skip it and users will provision a PIN happily, then fail to reach on-prem file shares the first time they try. The </font><a href="https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust"><font face="Verdana" size="3">cloud Kerberos trust deployment guide</font></a><font face="Verdana" size="3"> walks through enabling it.</font></p>
<h4><font face="Verdana" size="3">Where to configure it</font></h4>
<p><font face="Verdana" size="3">For greenfield Autopilot tenants, the fastest path is the Intune tenant-wide enrolment policy at <strong>Intune admin center → Devices → Enrolment → Windows → Windows Hello for Business</strong>. Set it to <em>Enabled</em> and configure the defaults there. That covers OOBE.</font></p>
<p><font face="Verdana" size="3">For everything else, build an explicit Account Protection policy at <strong>Intune admin center → Endpoint security → Account protection → Create Policy → Windows → Account protection → Windows Hello for Business</strong>. This is the one you target at device groups for staged rollout. Microsoft&#8217;s </font><a href="https://learn.microsoft.com/en-us/intune/device-security/identity-protection/configure-tenant-wide-policy"><font face="Verdana" size="3">tenant-wide policy guide</font></a><font face="Verdana" size="3"> explains the precedence rules; read it before you layer policies.</font></p>
<h4><font face="Verdana" size="3">A rollout pattern that survives contact with users</font></h4>
<p><font face="Verdana" size="3">I run three rings and I don&#8217;t apologise for how boring it looks.</font></p>
<p><font face="Verdana" size="3">Ring 1: five to ten IT-adjacent devices for two weeks. You&#8217;re looking for PIN provisioning completion and on-prem resource access — not for smiles.</font></p>
<p><font face="Verdana" size="3">Ring 2: one full business unit, minimum fifty devices, two to three weeks. This is where you catch VPN quirks, smartcard reader conflicts, and the one shared PC nobody told you about.</font></p>
<p><font face="Verdana" size="3">Ring 3: the rest of the fleet, staged over a fortnight by device group, not by user.</font></p>
<p><font face="Verdana" size="3">Stage by device, not by user, because Windows Hello is a per-device-per-user credential. Chasing user groups creates a weird matrix where someone&#8217;s laptop prompts for a PIN but their desktop doesn&#8217;t, and the helpdesk gets blamed for inconsistency.</font></p>
<h4><font face="Verdana" size="3">The pitfalls that burn you</font></h4>
<p><font face="Verdana"><font size="3"><strong>Rolling back is worse than rolling forward.</strong> Disabling the policy doesn&#8217;t remove provisioned PINs; it just stops new ones. Plan the forward path before you enable it.</font></font></p>
<p><font face="Verdana"><font size="3"><strong>Don&#8217;t mix trust types.</strong> If you have leftover key trust policy from an old deployment, retire it before enabling cloud Kerberos trust on the same fleet. The </font></font><a href="https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust"><font face="Verdana" size="3">hybrid key trust guide</font></a><font face="Verdana" size="3"> is still published, and Microsoft explicitly recommends against key trust for new deployments — pay attention to that.</font></p>
<p><font face="Verdana"><font size="3"><strong>Shared and kiosk devices need explicit exclusions.</strong> WHfB binds a credential to a user-device pair, which is exactly wrong for a front-desk PC logged in as five different people a day. Use Intune filters to carve those devices out of the policy.</font></font></p>
<p><font face="Verdana" size="3">Get the prerequisites right, pick cloud Kerberos trust, ring it, and Windows Hello becomes the quietest part of your security stack. Which is what you want.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/07/windows-hello-for-business-pick-cloud-kerberos-trust-and-move-on/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13207</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-70.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>Friction is the problem</title>
		<link>https://blog.ciaops.com/2026/05/07/friction-is-the-problem/</link>
					<comments>https://blog.ciaops.com/2026/05/07/friction-is-the-problem/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Wed, 06 May 2026 21:12:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[Sales]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13023</guid>

					<description><![CDATA[Here’s the uncomfortable truth most MSPs and consultants won’t admit: the problem with sales isn’t lead volume, pricing, or even competition. It’s friction. Too many steps. Too much chasing. Too many maybes clogging up your calendar and your head. If you’ve ever found yourself following up with someone who “just needs a bit more time”, &#8230; <a href="https://blog.ciaops.com/2026/05/07/friction-is-the-problem/" class="more-link">Continue reading <span class="screen-reader-text">Friction is the&#160;problem</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-29.png"><img loading="lazy" width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-29.png?w=442&#038;h=294" border="0"></a></p>
<p><font face="Verdana" size="3">Here’s the uncomfortable truth most MSPs and consultants won’t admit: the problem with sales isn’t lead volume, pricing, or even competition. It’s friction. Too many steps. Too much chasing. Too many maybes clogging up your calendar and your head.</font></p>
<p><font face="Verdana" size="3">If you’ve ever found yourself following up with someone who “just needs a bit more time”, you already know how this ends. Ghosted inbox. Awkward check‑in. Energy wasted on people who were never going to buy in the first place.</font></p>
<p><font face="Verdana" size="3">There <em>is</em> a simpler way to sell. Not a hack. Not a funnel with seventeen moving parts. Just a cleaner path for the right buyer to move from recognising a problem to committing to a solution.</font></p>
<p><font face="Verdana" size="3">It starts with clarity.</font></p>
<h5><font face="Verdana" size="3">Make the decision easy, not emotional</font></h5>
<p><font face="Verdana" size="3">Most sales calls exist because the offer isn’t clear enough on its own. When pricing, scope, outcomes, and expectations are fuzzy, people feel unsafe deciding. So they ask for a call. Or another call. Or “one last question”.</font></p>
<p><font face="Verdana" size="3">A well‑constructed offer document removes that uncertainty. It spells out exactly <strong>who it’s for</strong>, <strong>what changes</strong>, <strong>what it costs</strong>, and <strong>what happens next</strong>. The wrong people self‑select out. The right people don’t need convincing.</font></p>
<p><font face="Verdana" size="3">If someone can’t say yes after reading a clear, specific offer, they were never your client anyway.</font></p>
<p><font face="Verdana" size="3">This is how you sell without talking.</font></p>
<h5><font face="Verdana" size="3">Attention beats persuasion every time</font></h5>
<p><font face="Verdana" size="3">Even great offers fail when there’s no urgency. Not fake scarcity. Real focus.</font></p>
<p><font face="Verdana" size="3">When there’s no timeframe to decide, people default to delay. Not because they don’t want the outcome — but because there’s no cost to waiting. That’s not a motivation problem. It’s a prioritisation one.</font></p>
<p><font face="Verdana" size="3">A short, defined buying window forces a decision. It compresses attention. It moves the offer from the “someday” pile into the “do I act now or not at all?” category.</font></p>
<p><font face="Verdana" size="3">And here’s the key: a deadline doesn’t pressure the buyer. It respects their time. They either act, or they opt out cleanly. No limbo. No follow‑ups. No chasing.</font></p>
<p><font face="Verdana" size="3">You can run this every week if you want. Same offer. Same structure. New group of buyers. Simple, repeatable, predictable.</font></p>
<h5><font face="Verdana" size="3">Demand is built <em>before</em> you sell</font></h5>
<p><font face="Verdana" size="3">If your offer relies on clever copy to create desire, you’ve already lost. Demand doesn’t start on launch day. It’s built in advance, through relevance and trust.</font></p>
<p><font face="Verdana" size="3">This is where most MSPs get it backwards. They build services first, then hope the market catches up.</font></p>
<p><font face="Verdana" size="3">Instead, you grow an audience around a problem you understand deeply. You share insight. Opinions. Practical guidance. Over time, people stop seeing you as “a provider” and start seeing you as <em>the obvious next step</em>.</font></p>
<p><font face="Verdana" size="3">So when you make an offer, it doesn’t feel like selling. It feels like progression.</font></p>
<p><font face="Verdana" size="3">That’s how you scale. Not with bigger funnels or louder campaigns, but with a warmer market that’s already aligned with how you think and how you work.</font></p>
<h5><font face="Verdana" size="3">Less noise. Better clients.</font></h5>
<p><font face="Verdana" size="3">The goal isn’t more leads. It’s fewer, better decisions.</font></p>
<p><font face="Verdana" size="3">No hand‑holding prospects. No endless objections. No paying a percentage just to get work you could close yourself. No energy drain from people who aren’t serious.</font></p>
<p><font face="Verdana" size="3">Just a clean system that respects your time and your buyer’s autonomy.</font></p>
<p><font face="Verdana" size="3">The right people don’t need chasing. They need clarity, focus, and a reason to act.</font></p>
<p><font face="Verdana" size="3">Build that, and sales stops being something you dread — and starts being something that just works.</font></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/07/friction-is-the-problem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13023</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-29.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>Intune Filters vs Assignment Groups: Stop Treating Them as Interchangeable</title>
		<link>https://blog.ciaops.com/2026/05/06/intune-filters-vs-assignment-groups-stop-treating-them-as-interchangeable/</link>
					<comments>https://blog.ciaops.com/2026/05/06/intune-filters-vs-assignment-groups-stop-treating-them-as-interchangeable/#respond</comments>
		
		<dc:creator><![CDATA[directorcia]]></dc:creator>
		<pubDate>Tue, 05 May 2026 23:29:00 +0000</pubDate>
				<category><![CDATA[Intune]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">http://ciaopsbloghome.wordpress.com/?p=13203</guid>

					<description><![CDATA[If your Intune estate has grown past a couple of hundred devices, you&#8217;ve probably built a forest of dynamic groups that only you understand. You don&#8217;t need another group. You need a filter. Here&#8217;s where each one earns its keep, and where MSPs keep getting the split wrong. The mental model Groups answer who the &#8230; <a href="https://blog.ciaops.com/2026/05/06/intune-filters-vs-assignment-groups-stop-treating-them-as-interchangeable/" class="more-link">Continue reading <span class="screen-reader-text">Intune Filters vs Assignment Groups: Stop Treating Them as&#160;Interchangeable</span> <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<h3><a href="https://blog.ciaops.com/wp-content/uploads/2026/04/image-70.png"><img loading="lazy" width="442" height="294" title="image" style="display: inline;background-image: none" alt="image" src="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-69.png?w=442&#038;h=294" border="0"></a></h3>
<p><font face="Verdana" size="3">If your Intune estate has grown past a couple of hundred devices, you&#8217;ve probably built a forest of dynamic groups that only you understand. You don&#8217;t need another group. You need a filter. Here&#8217;s where each one earns its keep, and where MSPs keep getting the split wrong.</font></p>
<h4><font face="Verdana" size="3">The mental model</font></h4>
<p><font face="Verdana" size="3">Groups answer <strong>who</strong> the policy targets. Filters answer <strong>which subset of that assignment it actually applies to at evaluation time</strong>. A group is resolved at assignment and refreshed on Entra&#8217;s schedule. A filter is evaluated per device, per policy, at the point of applicability. That timing difference is the entire reason filters exist — and the reason swapping one for the other silently changes behaviour.</font></p>
<p><font face="Verdana" size="3">Use groups for ownership of the assignment (department, site, client tenant, pilot ring). Use filters for device traits that change underneath you: OS version, model, enrollment profile, personal vs corporate, join type.</font></p>
<h4><font face="Verdana" size="3">Prerequisites people miss</font></h4>
<ul>
<li><font face="Verdana" size="3">Filters only work on <strong>managed devices and managed apps</strong> — the supported workload matrix matters. Not every policy type honours filters, and app assignment filters for MAM are a different object from device assignment filters. Check the reference before assuming your policy can be filtered.<br />
</font></p>
<li><font face="Verdana" size="3">Dynamic device groups require at least one Entra ID P1 licence in the tenant. Business Premium covers you, but confirm before promising dynamic membership to an M365 Standard client.<br />
</font></p>
<li><font face="Verdana" size="3">The &#8220;All users&#8221; and &#8220;All devices&#8221; virtual groups bypass normal targeting logic. If a client&#8217;s environment feels &#8220;haunted&#8221;, check whether a legacy assignment is hitting All devices with no filter.</font></li>
</ul>
<h4><font face="Verdana" size="3">Where to configure</font></h4>
<p><font face="Verdana" size="3">In the <strong>Intune admin center</strong>, filters live under <strong>Tenant administration → Filters</strong>. Build the rule, pick the platform, and save — the filter itself has no targets. You apply it at assignment time on any supported policy (Devices → Configuration → <em>your profile</em> → Assignments → Edit filter).</font></p>
<p><font face="Verdana" size="3">Groups are managed in the same console under <strong>Groups</strong>, but remember these are Entra ID security groups — any change you make is tenant-wide, not Intune-only.</font></p>
<h4><font face="Verdana" size="3">The rollout pattern that actually works</font></h4>
<ol>
<li><font face="Verdana"><font size="3"><strong>Ring by group, scope by filter.</strong> Three device groups (Pilot, Early, Broad) assigned by user or device attribute. Apply the same policy to all three with different filters (e.g. <code>deviceOwnership -eq "Corporate"</code> plus <code>osVersion -startsWith "10.0.22"</code>).<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Exclude filters beat exclusion groups.</strong> If you&#8217;re excluding kiosks from a CA-backed compliance policy, a filter keyed on <code>enrollmentProfileName</code> is faster to audit than a stale exclusion group nobody refreshes.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Name everything for future-you.</strong> <code>FLT-Win11-Corp-NotKiosk</code> beats <code>Filter1</code>. Same for groups: prefix by purpose (<code>INT-</code> for Intune-only, <code>SEC-</code> for CA), include platform, include intent.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Test in report-only.</strong> Every new filter goes onto one profile assigned to a lab group first. Confirm the <em>Assignment status</em> report matches expectation before widening.</font></font></li>
</ol>
<h4><font face="Verdana" size="3">The pitfalls that will bite you</font></h4>
<ul>
<li><font face="Verdana"><font size="3"><strong>Filter evaluation is not group membership.</strong> A filter excluding &#8220;personal&#8221; devices won&#8217;t retroactively remove a policy from a device that was previously &#8220;corporate&#8221; until the device checks in and the assignment re-evaluates. Plan for the delay during ownership changes.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Negation logic is deceptively literal.</strong> <code>-notEquals</code> treats a null property as &#8220;not equal&#8221;, so filters on sparsely populated properties (custom enrollment profile names, model on older hardware) can match devices you didn&#8217;t intend. Test with <code>-eq</code> plus include/exclude to lock it down.<br />
</font></font></p>
<li><font face="Verdana"><font size="3"><strong>Overlapping filters on the same assignment don&#8217;t AND.</strong> If you add a filter and also use include/exclude groups, precedence rules apply — exclude always wins, then filters, then includes. Map this out before complaining about &#8220;Intune not applying my policy.&#8221;</font></font></li>
</ul>
<h4><font face="Verdana" size="3">References</font></h4>
<ul>
<li><a href="https://learn.microsoft.com/en-us/intune/fundamentals/filters/overview"><font face="Verdana" size="3">Create assignment filters in Microsoft Intune(opens in new window)</font></a>
<li><a href="https://learn.microsoft.com/en-us/intune/fundamentals/filters/ref-supported-workloads"><font face="Verdana" size="3">Platforms and policy types supported by assignment filters(opens in new window)</font></a>
<li><a href="https://learn.microsoft.com/en-us/intune/fundamentals/filters/ref-device-properties"><font face="Verdana" size="3">Assignment filter properties and operators reference(opens in new window)</font></a>
<li><a href="https://learn.microsoft.com/en-us/intune/fundamentals/tenant-administration/add-groups"><font face="Verdana" size="3">Use groups to organize users and devices for Microsoft Intune(opens in new window)</font></a></li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ciaops.com/2026/05/06/intune-filters-vs-assignment-groups-stop-treating-them-as-interchangeable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13203</post-id>
		<media:content url="https://2.gravatar.com/avatar/808247b34308ebd984bd5010d7487881c8701850e2c80e2f4068e4faa254f139?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">directorcia</media:title>
		</media:content>

		<media:content url="https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-69.png" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
	</channel>
</rss>
