The True Cost of a Software Switch

Understanding Software (and the Hidden Costs)

The day started with a straightforward goal: confirm whether a dental software platform the practice was testing as a replacement would work with the imaging sensors they already own.

That quickly turned into the usual vendor relay—back and forth between the company that makes the replacement dental software and the company that makes the dental sensors. Over a series of calls and remote testing sessions, we compared requirements, validated compatibility details, and confirmed the correct drivers. In the end, we landed on the real answer: even with the right drivers installed, the replacement software still wouldn’t work as a practical solution with their existing sensors.

[Read more]

Authentication Context in Microsoft 365

Conditional Access Policy

All Users – Auth Context Sensitive Data – Require Compliant Device

Users

Include: All Users  
Exclude: Break glass account

Target Resources

Drop down to Authentication Context 
	Check the box next to the Authentication context policy that was created. 

Grant

Grant Access
	Require Authentication Strength
		Select the strength 
	Select Require device to be marked as compliant
[Read more]