top of page



MDI: Notes from the Field
In this blog, I have documented issues experienced and resolved during a Microsoft Defender for Identity (MDI) deployment

Will Francillette
Mar 253 min read
365 views
0 comments


Mastering the Graph API: 10 reasons to learn PowerShell in 2025
This new series on the Graph API will take advantage of PowerShell and deep dive in Entra, Defender XDR or Intune.

Will Francillette
Mar 234 min read
164 views
0 comments


Entra: Securing Teams Phones using Conditional Access - The Device Code Flow Dilemma
This blog relates to difficulties I encountered with CA policies when securing device code flow in a MS Teams Phones environment

Will Francillette
Mar 165 min read
421 views
0 comments


Entra: Integrate Passkey registration with your Conditional Access Framework
In this blog we will explore the process of registering Passkeys within a robust Conditional Access framework.

Will Francillette
Mar 94 min read
1,364 views
0 comments


Azure DevOps: Use Entra ID Managed Identities in your pipelines
Apply best practices and use Entra ID Managed Identities for your Azure DevOps pipelines

Will Francillette
Oct 30, 20246 min read
180 views
0 comments


ADO: Resolve 404 (Not found) Error when using Azure DevOps Artifacts feed for your private PowerShell repositories
Install a PS module from a private Azure DevOps Artifacts feed and resolve Response status code does not indicate success: 404 (Not Found)

Will Francillette
Oct 7, 20242 min read
52 views
0 comments


MDE: Why and how to use Device Groups?
Why and how to create device groups in Microsoft Defender for Endpoints

Will Francillette
Sep 30, 20244 min read
788 views
0 comments


MDE: Identify and understand EDR conflict with your applications
Identify and understand MDE EDR conflict with your applications

Will Francillette
Mar 27, 20244 min read
2,830 views
0 comments


Implementing CISA’s Zero Trust Architecture: A Microsoft Approach - Identity: Authentication
Use Microsoft solutions to secure the authentication process as recommended by CISA Zero Trust model.

Will Francillette
Mar 7, 202410 min read
1,428 views
1 comment


Implementing CISA’s Zero Trust Architecture: A Microsoft Approach - Maturity Model
CISA’s Zero Trust Architecture: A Microsoft Approach - Maturity Model

Will Francillette
Feb 9, 20243 min read
317 views
0 comments


Implementing CISA’s Zero Trust Architecture: A Microsoft Approach - Introduction
Today, I want to start a new series on a topic that has a lot of misconception and have been misused for commercial gain. It's often...

Will Francillette
Feb 2, 20242 min read
426 views
0 comments


Connect to Advanced Hunting API with the Graph SDK PowerShell module
Microsoft Graph Security API simplified connection

Will Francillette
Jan 14, 20243 min read
1,198 views
0 comments


MDE: Keeping your Antivirus up to date - deep dive
If you have a look at Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Zero Trust implementation guidance, you will...

Will Francillette
Jan 2, 20249 min read
4,526 views
1 comment


M365DSC: Conditional Access Monitoring Automation
M365DSC: Conditional Access Monitoring Automation

Will Francillette
Nov 2, 202311 min read
2,474 views
1 comment


M365DSC: Monitor Conditional Access Policy Configuration Drift with Microsoft Sentinel
M365DSC: Monitor Conditional Access Policy Configuration Drift with Microsoft Sentinel

Will Francillette
Aug 29, 20234 min read
1,625 views
0 comments


M365DSC: Use Azure Arc and Managed Identities to authenticate on-premises and 3rd party cloud
M365DSC: Use Azure Arc and Managed Identities to authenticate on-premises and 3rd party cloud

Will Francillette
Jun 14, 20233 min read
1,328 views
0 comments


M365DSC: Getting Started Part 3 - Plan, Design and Manage your Microsoft 365 workloads
M365DSC: Getting Started Part 3 - Plan, Design and Manage your Microsoft 365 workloads

Will Francillette
May 31, 20237 min read
2,328 views
1 comment


MDE: Windows disconnected environment - decision tree
It has always been challenging to deploy MDE in a disconnected environment i.e. behind a proxy. Thankfully, Microsoft and Brian Baldock...

Will Francillette
Apr 5, 20233 min read
2,548 views
2 comments


M365DSC: Getting Started Part 2: Installation, authentication and export configuration
M365DSC: Getting started - installation, authentication and first export

Will Francillette
Mar 14, 20234 min read
5,295 views
0 comments


M365DSC: Getting Started Part 1- Desired State Configuration
M365DSC series: getting started - Desired State Configuration introduction

Will Francillette
Feb 26, 20234 min read
5,344 views
0 comments
About Me
​

I am a Microsoft Solutions Architect specialized in Microsoft 365, Entra and Azure security products at Threatscape.
I love learning, blogging and coding. My interests are very diverse and span across architecture, security, cloud engineering, automation, DevOps and PowerShell.
I own as of today 17x (and counting) Microsoft certifications and have worked in IT across multiple and diverse industries for over 15 years.
bottom of page