sbd.org.uk

Practical guides forarchitects

Enterprise M365 architecture, endpoint management, security baselines, and infrastructure automation. Deep dives with companion code you can use today.

15+

Articles

38

Topics

M365

Focus

Free

Always

Geometric blueprint pattern representing M365 solution architecture with colour-coded zones for identity, security, endpoints, and governance
7 April 2026·13 min read

M365 Solution Architect: What the Role Actually Covers

What an M365 Solution Architect actually does: standards ownership, security architecture, licensing strategy, and delivery oversight. Beyond diagrams.

M365 Solution Architect: What the Role Actually Covers

Intune security baselines vs CIS benchmarks comparison and decision framework visualization
24 March 2026·18 min read

Intune Security Baselines vs CIS Benchmarks: A Decision Guide

Compare Intune security baselines against CIS benchmarks using a PowerShell export-and-diff workflow. Includes ASR deployment, deviation tracking, and a decision framework.

Intune Security Baselines vs CIS Benchmarks: A Decision Guide

Microsoft 365 E3 vs E5 licensing decision framework visualization
17 March 2026·12 min read

Microsoft 365 E3 vs E5: Decision Framework for Architects

M365 E3 vs E5 decision framework for architects: TCO breakpoints, cost comparison scripts, and the rule for when E5 actually beats E3 plus add-ons.

Microsoft 365 E3 vs E5: Decision Framework for Architects

Abstract geometric visualization of Microsoft 365 tenant health monitoring
10 March 2026·10 min read

Why Your M365 Tenant Is a Mess (And How to Fix It)

Microsoft 365 tenant health audit checklist: detect orphaned groups, expired app secrets, CA policy sprawl, and SharePoint chaos with Graph API scripts.

Why Your M365 Tenant Is a Mess (And How to Fix It)

Abstract geometric illustration representing Conditional Access policy flows in Microsoft Entra
3 March 2026·13 min read

Conditional Access Policies That Actually Work: Lessons from 20 Deployments

The patterns that survive contact with production, a baseline CA policy set built from common mistakes, circular dependencies, and hard-won lessons across multiple Microsoft 365 deployments.

Conditional Access Policies That Actually Work: Lessons from 20 Deployments

More Articles

View all

Stay in the loop

New articles on M365 architecture, security baselines, and automation. No spam, just practical engineering content.