Feel free to reach out to me using these channels:

Mailmok @
Business mail / Microsoft Teams IMmok @


Cloud & Security Architect, blogger on and speaking at events.
Top-contributor in Cloud Security Customer Connection Program and Microsoft 365 Defender Customer Connection Program.


Highly experienced Azure & Microsoft 365 Security specialist, who have been been in the IT-industry since 1991 working with Microsoft-technologies since 1994.

I work as a freelance consultant with focus on Azure, Microsoft 365 cloud and security technologies. My roles are primarily technical advisory, design and implementation for customers, but secondly I am also helping my customers with the needed processes and getting their management and it-organization to support and adopt cloud – including operating model, cost management, reporting and governance.

My areas of technical specialization are Azure infrastructure, Microsoft Defender platform, Microsoft Sentinel, Microsoft LogAnalytics, Microsoft Workbooks, Azure Arc, Azure Resource Graph, Azure Extensions, Azure Monitor and scripting.

I have also built an entire reporting framework with +35 dashboards bringing 20 Microsoft technologies together in a holistic view focusing on showing a desired-state and tracking security-deviations, operational-issues and cost-changes.

I love to travel with my family and visit new places in the world to understand how life is there; how people live; try to taste what they eat; understand their challenges, etc.

Our vacations are often ‘action-related’ covering activities life diving including shark-diving, skiing, ziplining, river-rafting, balloons, safari, watch F1, luges, bike riding, etc.

I love to dive and am a PADI Dive Master and PADI Master Scuba Diver.

What I do? | Technology enabling

Design & Implementation of Azure landing zone structure for enterprise-scale setupMicrosoft Cloud Adoption Framework (CAF)
Implementation of Azure policies – based on MS CAFAzure Policy
Implementation of Azure delegation structure (using AD and/or AAD cloud groups)AD/AAD Roles
Implementation of Azure AD Identity ManagementAzure AD
Azure AD Self-service Password
Azure AD MFA
Azure AD Identity Protection
Azure AD Connect
Azure AD Conditional Access
Azure AD Identity Governance
Azure AD Access Reviews
Azure AD Privilege Identity Management (PIM)
Automation of Azure resource provisioningAzure
Design & Implementation of hub-environments for connectivity in enterprise scale setupAzure Virtual Wan
Azure S2S VPN
Azure ExpressRoute
Azure Firewall
Cisco Meraki
Palo Alto NVA
CheckPoint NVA
FortiGate NVA
Automation of Azure Arc for on-premise serversAzure Arc
Automatic download and update of Azure Arc agents on existing clients, structured in dev/test/prodAzure Arc
Automatic management of existing Azure Arc implementation (with automatic mitigation of issues)Azure Arc
Design & Implementation of Data Collection Rules for Collection of Event logsAzure Monitor
Design & Implementation of Data Collection Rules for Collection of Performance & ServiceMap dataAzure Monitor
Design & Implementation of Data Collection Rules for Collection of Syslog & CEF dataAzure Monitor
Design & Automation of Azure Extensions implementation & managementAzure Extensions
Design & Implementation of patch managementAzure Update Management Center
Azure Automation Update Management
Design & Implementation of Microsoft SentinelMicrosoft Sentinel
Automation of Sentinel alert rules managementMicrosoft Sentinel
Implementation of Azure Workbooks & Dashboards for operation / security / cost overviewAzure Workbooks
Azure Dashboards
Design & Implementation of Microsoft Defender for CloudMicrosoft Defender for Cloud (MDC)
Design & Implementation of Microsoft Defender for IdentityMicrosoft Defender for Identity (MDI)
Design & Implementation of Microsoft Defender for Office 365Microsoft Defender for Office 365 (MDO)
Design & Implementation of Microsoft Defender for ApplicationsMicrosoft Defender for Application (MCAS)
Design & Implementation of Microsoft External Attack Surface ManagementMicrosoft Defender External Attack Surface Management (EASM)
Design & Implementation of Microsoft Defender for EndpointMicrosoft Defender for Endpoint (MDE)
Migration to / Implementation of Microsoft Defender AntivirusWindows Defender Antivirus
Implementation of Microsoft Secure Score baseline recommendationsM365 Defender suite
Implementation of Azure cost managementAzure cost management

What I do ? | Processes & Organizational projects

Advisory on working with security recommendations
(processes & org – who, when, what, how)
Microsoft Defender for Cloud
Microsoft Secure Score
Advisory on establishment of KPIs & dashboards
(who, when, how, what, governance, change management)
Azure | M365
Advisory on cost management structure (automation, reporting, notifications)Azure
Advisory on cloud structure & roles including skills mappingAzure | M365
Advisory on cloud adoption (people motivation, goals)Azure | M365