Welcome to the GeekWolf website

This site aims to give insights, best practices and tips & tricks into the Microsoft stack with a particular focus on Identity, although I will no doubt drift into Entra ID, On-Premises, Microsoft 365, Google and Azure. Having been in the Microsoft stack for a long time and with a development background in my early years, you will see PowerShell, Graph and perhaps even some C# code. I have collated the blogs into Categories (which are shown in the menu on the left)(which are shown in the hamburger menu above) and Tags (which are shown in the tag cloud in the bottom left)(which are shown in the tag cloud at the bottom) I hope you enjoy the site, please feel free to comment on any post. If you want a regular update sent to you summarising the recently added posts, then please subscribe to the newsletter.

Here is a list of the most recent blogs:

Google Workspace versus Microsoft 365

In today’s digital workspace, choosing the right productivity suite can significantly impact your organisation’s efficiency and collaboration. Google Workspace and Microsoft 365 are the leading solutions in this space, each offering a robust set of tools tailored to different needs. This blog will compare Google Workspace and Microsoft 365 across...

Read More

Lining up Teams, Slack and Google Chat

In the business world today, effective communication and collaboration are crucial. Three popular tools designed to facilitate these aspects are Microsoft Teams, Slack, and Google Workspace Chat. Each platform has its strengths and unique features, making them suitable for different organisational needs. Here’s a detailed comparison to help you choose...

Read More

Comparing Okta and Entra ID

In the landscape of identity and access management (IAM), two prominent players are Okta and Microsoft Entra ID (formerly Azure Active Directory). Each offers a suite of features designed to manage user identities, access, and security, but they cater to different needs and technological environments. This blog will provide an...

Read More

Overview of the Microsoft security stack

As the digital landscape evolves, organisations face increasingly sophisticated threats that target various aspects of their infrastructure. Microsoft 365 (M365) offers a comprehensive suite of security products designed to protect identities, data, devices, and networks in both cloud and hybrid environments. While M365’s security tools provide robust protection, organisations may...

Read More

Compare Microsoft Global Secure Access and ZScalar

In an increasingly digital world, securing access to corporate resources is more critical than ever. As organisations embrace remote work and cloud-based services, the need for robust security solutions to protect data and ensure seamless access has surged. Two prominent players in this domain are Global Secure Access (GSA) from...

Read More

What is Microsoft Global Secure Access

In today’s digital world, as organisations continue to embrace hybrid work models and cloud-based solutions, ensuring secure access to resources across a global workforce has become a critical challenge. Microsoft’s Global Secure Access (GSA) aims to address this by offering a comprehensive solution designed to protect users, devices, and data....

Read More

Deep dive into Azure AD SSO

As organisations increasingly adopt cloud-first strategies, hybrid environments have become the norm. Azure Active Directory (Azure AD), now part of Microsoft’s Entra product family, is the identity platform for managing users, devices, and access to resources across cloud and on-premises environments. One critical aspect of this integration is ensuring seamless...

Read More

Deep dive into Windows hybrid join

Entra Hybrid Join (EHJ) is a critical feature that allows Windows 10/11 devices to be registered in both on-premises Active Directory (AD) and Entra ID (previously Azure AD). This capability enables seamless single sign-on (SSO) across on-premises and cloud services, simplifying device management and enhancing security. This blog will guide...

Read More

Active Directory migration overview

Migrating from one Active Directory (AD) environment to another is a complex and delicate task that requires careful planning and execution. This guide will walk you through the essential steps and considerations for a successful AD-to-AD migration, focusing on minimising user impact, maintaining security, and ensuring ongoing access to critical...

Read More

Strong authentication overview

In today’s cybersecurity landscape, robust authentication methods are crucial to protect sensitive information and ensure that only authorised users can access critical systems. Microsoft offers a range of strong authentication options tailored to meet diverse security needs, categorised into three key areas: multifactor authentication (MFA), passwordless authentication, and phishing-resistant authentication....

Read More
Follow
Follow