GEMXIT brings together Microsoft security, Azure architecture, training and development to solve real problems — improving visibility, reducing risk and delivering systems that actually hold up under pressure.
Azure environments that are secure, controlled and cost-efficient — with governance, visibility and architecture that actually make sense.
👉 Deep dive: Cloud Services
Identity, endpoint and cloud security built around visibility — uncovering real activity using Defender, Sentinel and Entra ID, not just relying on alerts.
👉 Deep dive: Cyber Security
Microsoft-aligned training built from real environments and real incidents — helping your team gain skills they can apply immediately, not forget next week.
👉 Deep dive: Training
Proven capability across Microsoft cloud, identity, administration, AI and training, backed by recognised certifications and real-world delivery experience.
Nominated for the Microsoft MCT Top 100 in 2024 and again in 2025, this recognition places me among the top 100 trainers globally out of more than 22,000 Microsoft Certified Trainers worldwide.
Through GEMXIT PTY LTD and GEMXIT UK LTD, the focus remains simple: practical skills, measurable outcomes, and training that works beyond the classroom.
As a Microsoft Training Services Partner (TSP), GEMXIT PTY LTD delivers Microsoft-certified training backed by real-world engineering experience. Every course is grounded in practical deployment scenarios, security-first design principles and measurable outcomes, bridging the gap between certification theory and operational capability.
We architect and secure identity platforms using Microsoft Entra ID, implementing Conditional Access policies, multi-factor authentication, privileged access management and governance controls. By embedding Zero Trust design principles and strong access lifecycle management, we help organisations strengthen their security posture while maintaining operational agility.
Advanced data protection and compliance across Microsoft 365, focusing on safeguarding sensitive information throughout its lifecycle. This certification demonstrates expertise in Microsoft Purview, including Data Loss Prevention (DLP), Information Protection, Insider Risk Management and eDiscovery. Emphasis is placed on identifying data risks, applying classification and protection policies, and implementing real-world controls to prevent data leakage and insider threats. Designed to align security with business operations, ensuring organisations can protect their most critical asset... their data.
Designing secure, scalable and cost-optimised Azure architectures across identity, networking, compute and storage. This certification reflects deep capability in translating business requirements into resilient cloud solutions, balancing performance, governance, security posture and operational efficiency. From hybrid environments to enterprise-scale deployments, every design prioritises reliability, clarity and long-term sustainability.
End-to-end Microsoft 365 administration across Exchange Online, SharePoint, Teams, Intune and compliance frameworks. Focused on building secure, productive and well-governed environments that empower users without compromising protection. Identity management, device compliance, information protection and collaboration architecture are delivered with a strong security-first mindset.
GEMXIT was founded in Australia in 2006 with a simple idea:
technology should be clear, secure and actually work in real environments.
Not over-engineered. Not over-promised. Just delivered properly.
Today, GEMXIT supports organisations across Australia and the United Kingdom across cloud, cybersecurity, training and development — with a focus on Microsoft security, real visibility and practical outcomes.
Led by Jonathan Foskett, a Microsoft Certified Trainer ranked in the Top 100 globally (2024 & 2025), GEMXIT brings together deep technical expertise with hands-on experience across real deployments, real incidents and real business environments.
This isn’t theory-led consulting.
It’s built on what actually happens in production.
Built over two decades of hands-on delivery across small business, enterprise systems and high-trust environments. Long-term relationships. Consistent results.
Security isn’t added later. It’s built into identity, access, infrastructure and monitoring from the start — using Microsoft Defender, Sentinel and Entra ID.
Most environments already have the data — they just don’t see it. GEMXIT focuses on uncovering what’s actually happening, not just what tools report.
Training is built from real environments, real incidents and real workflows — helping teams build skills they can actually use.
Built around established platforms, recognised ecosystems and trusted industry relationships that support secure, modern delivery.
These are not just blog posts. They are practical investigations built around the same thinking used when reviewing client environments: ask better questions, read the logs properly, and find what normal dashboards often miss.
No alert triggered... but the data told a different story.
A practical look at exposed remote administration, constant internet scanning, and what a simple cloud misconfiguration can really mean in the real world.
Read briefingA practical look at AI security, governance, access control and prompt risk when productivity tools are introduced before proper boundaries are defined.
Read briefingA practical Azure security lesson on public blob access, cloud data exposure and why storage controls matter more than people think.
Read briefing
GEMXIT is registered with the Australian Cyber Security Centre (ACSC)
and aligns security practices to current ACSC guidance, including the
Essential Eight mitigation strategies.
This provides access to current threat intelligence, security advisories and
best practice recommendations — applied in real environments using Microsoft Defender,
Sentinel and Entra ID.
Rather than treating frameworks as compliance exercises, GEMXIT applies ACSC principles
in a practical way — focusing on identity protection, reducing attack surface,
improving visibility and strengthening real-world response capability.
Most environments don’t fail because tools are missing.
They fail because controls aren’t applied effectively.
👉 The focus is simple: reduce real risk, not just meet a standard.
Focus on the controls that matter most: application control, patching, MFA, least privilege and user protection — reducing real attack surface, not just ticking boxes.
Strong Conditional Access, MFA enforcement and identity monitoring using Microsoft Entra ID — because modern attacks target identity first.
Microsoft Defender and Sentinel used for real visibility — focusing on behaviour, correlation and investigation, not just alerts.
Reduce exposure by limiting access, removing standing privilege and enforcing governance across users, administrators and systems.
Not just prevention — building the ability to detect, respond and recover quickly when something goes wrong.
Designed for real businesses — balancing security, usability and operational reality instead of over-engineered solutions.
Real-world Microsoft Defender, Sentinel and Entra ID investigations. Built for analysts and organisations that want to move from alerts… to understanding what actually happened.
The fastest way to investigate suspicious emails in Microsoft Defender. Includes copy-ready KQL queries for spoofing, DMARC failures and delivery analysis.
EmailEvents
| where SpoofedDomain != ""
| project Timestamp, SenderFromAddress, Subject
Learn how to detect spoofed emails using EmailEvents, AuthenticationDetails and sender mismatch analysis.
EmailEvents
| where AuthenticationDetails has "dmarc=fail"
Understand why emails fail DMARC but still get delivered — and how to investigate them properly.
EmailEvents
| where AuthenticationDetails has "dmarc=fail"
| where DeliveryAction has_any ("Delivered", "Allowed")
Core KQL queries used across Microsoft Defender and Sentinel to detect suspicious behaviour and hidden activity.
EmailEvents
| where SenderFromDomain != SenderMailFromDomain
| project Timestamp, SenderFromAddress, RecipientEmailAddress
Break down SPF, DKIM and DMARC results in Microsoft Defender and understand what the logs are really telling you.
EmailEvents
| where AuthenticationDetails has_any ("spf=fail", "dkim=fail", "dmarc=fail")
| project Timestamp, SenderFromAddress, AuthenticationDetails
Practical detection, monitoring and response workflows across Microsoft Sentinel, Defender XDR and SOC environments.
SecurityAlert
| summarize AlertCount=count() by AlertName, Severity
| order by AlertCount desc
Full overview of Microsoft Defender, Sentinel, Entra ID and Zero Trust architecture for modern organisations.
MicrosoftSecurity
| project Defender, Sentinel, EntraID, ZeroTrust
Microsoft security services for Australian organisations, aligned with ACSC guidance and real-world environments.
AzureSecurity
| where Location == "Melbourne"
| project Cloud, Identity, Defender, Review
If you want real visibility, not just dashboards and reports, let’s run a practical security review and see what is actually happening.
GEMXIT operates across Australia and the United Kingdom, delivering Microsoft security reviews, Azure cloud services, Microsoft training and secure custom development.
GEMXIT PTY LTD provides Microsoft security reviews, cyber security services, Azure cloud consulting, Microsoft training, Microsoft 365 administration, identity and access management, Microsoft Entra security, Microsoft Defender XDR and Microsoft Sentinel-aligned security solutions, cloud migrations and secure custom software development across Australia and the United Kingdom.
Services include Azure architecture, cloud governance, Microsoft security uplift, endpoint protection, security monitoring, Microsoft Certified Trainer-led learning, secure development and modern business systems.