This very small blog will be about the improvements in the Target Policy in App […]
The isEncrypted with Steve Zissou
This short blog will be about a question I received on Linkedin. The question was […]
Autopilot for pre-provisioned deployment and the lost Azure/Entra Ad Join
This blog will be about an Autopilot White Gloved device that ended up in Intune […]
Honeypot: The Last Reconnaissance
After reading this fantastic article on the Technet Community about the Attack Kill Chain, I […]
Godfather of Logging
After reading a question on (yes I know) a Facebook group about how to monitor […]
Endpoint & Security, The Curse of the Were-Applocker
This blog will be all about the Endpoint Security series blogs I have written until […]
The Death of Compliance
This blog will show you how Device-Based Conditional Access works and how it determines if […]
Remote App: The Last Whish
In one of my older blogs, I talked a lot about how and why you […]
Sandbox: Multiverse of Madness
In the rapidly evolving world of IT management, staying ahead of potential issues before they […]
Last PID.txt Standing
This time, a small blog about the PID.txt. This blog will show you that reinstalling […]