Skip to main content

Posts

Showing posts from September, 2025

Tools to Make Patch Management Easier

Manual patching across hundreds or thousands of devices is unrealistic. The good news is that there are tools, some free or low-cost, that can help automate and streamline the process. 1. Action1 (Cloud Patch Management) Free for up to 200 endpoints. Cloud-based, no on-prem server required. Works across Windows environments. Features: Patch deployment, reporting, and remote software installation. Great fit for smaller districts or those with limited infrastructure. 2. Mosyle (for macOS/iOS Devices) Cloud-native Apple device management. Automates macOS and iOS patching. Free tier available for smaller deployments. Excellent choice for schools running large Apple fleets. 3. Microsoft Intune (Education Licensing) Often already included in Microsoft 365 A3/A5 education licenses. Provides centralized patch management for Windows devices. Supports compliance policies and reporting. Best if your district is already invested in Microsoft’s ecosystem. 4. WSUS (Windows Server Update Services) F...

Stopping Phishing Emails in Microsoft 365 and Google Workspace: Practical Configurations

Phishing is the leading attack vector against schools. While user awareness training is essential, the strongest defense is stopping phishing emails before they ever reach staff and students. Microsoft 365 (Exchange Online Protection) and Google Workspace provide built-in security controls that can block or quarantine phishing attempts at no extra cost. Here’s how to configure them. Microsoft 365 (Exchange Online / Entra) Microsoft Documentation: https://learn.microsoft.com/en-us/defender-office-365/anti-phishing-policies-mdo-configure 1. Enable Anti-Phishing Policies Go to the Microsoft 365 Security & Compliance Center . Navigate to Threat Management → Policy → Anti-Phishing . Enable built-in impersonation protection to detect lookalike domains and spoofed accounts. Impact: Helps prevent phishing that impersonates staff, leadership, or vendors. 2. Quarantine Suspicious Messages Instead of sending suspicious emails to Junk, configure Quarantine policies . Go to Threat Policies → ...