Microsoft 365, done properly.
Email, Teams, SharePoint, and the security and identity layer underneath. Migrations, tenant management, MFA, Conditional Access — done so it works on Monday and keeps working.
The full M365 stack, configured for the long term.
Tenant setup & migration
Greenfield tenants, tenant-to-tenant moves, or lift-and-shifts from on-prem Exchange. Including the bits everyone forgets — DNS, MX, SPF, DKIM, DMARC.
Mailbox management
User mailboxes, shared mailboxes, distribution lists, calendar permissions. The plumbing that should just work — and usually doesn't, until someone sets it up properly.
Teams & SharePoint
Sensible information architecture, permissions you can explain, and channels that don't multiply uncontrollably. Plus the SharePoint sites underneath that nobody warned you about.
MFA & Conditional Access
Authenticator app rollouts, Conditional Access baselines, and named-location policies. Including a recovery plan for the day someone leaves their phone in a taxi.
Intune device management
Windows and macOS endpoints enrolled, compliant, and policy-managed. BYOD where it makes sense, fully managed where it doesn't.
Security baseline
Defender for Office, anti-phishing, safe attachments, audit logging, and the dozen other toggles that ship off by default and shouldn't.
Email that works. Identity that doesn't get phished. Meetings that join on time.
The boring details of M365 are the difference between a productive Monday and a six-hour incident call.
The unglamorous work, done quietly.
Tenant-to-tenant moves following acquisitions and rebrands — mail, OneDrive, SharePoint sites, Teams, and the licence reshuffle that comes with them.
On-prem Exchange retirements, including the half-decommissioned ones someone started in 2019 and never finished. Hybrid configurations unpicked, public folders migrated, and certificates rotated before the bad ones expire.
Shared mailbox cleanups where the inbox count has crossed the 50,000-item threshold and Outlook has started behaving strangely. Right-sizing, archiving, retention policies, and the awkward conversation about which of the eighteen distribution lists are actually still in use.
Audit-log investigations after suspicious sign-ins, suspected mailbox compromise, or the message from the bank that nobody remembers sending. Forensics, containment, and the post-incident report that the insurer wants.
Got a migration coming up?
Tell us what you're moving from, what you're moving to, and when it has to happen by. We'll come back with a plan.