After reading a question on (yes I know) a Facebook group about how to monitor […]
Endpoint & Security, The Curse of the Were-Applocker
This blog will be all about the Endpoint Security series blogs I have written until […]
The Death of Compliance
This blog will show you how Device-Based Conditional Access works and how it determines if […]
Remote App: The Last Whish
In one of my older blogs, I talked a lot about how and why you […]
Sandbox: Multiverse of Madness
In the rapidly evolving world of IT management, staying ahead of potential issues before they […]
Last PID.txt Standing
This time, a small blog about the PID.txt. This blog will show you that reinstalling […]
The Battle Between Entra Joined and Entra Registered devices
This blog will discuss AADJ/Entra Joined vs. AADR/Entra Registered. It hopes this blog will provide […]
Those who wish me ADAL/MSAL
This blog will contain information about MSAL, ADAL, OAuth, and some tokens. I will also […]
The Quick and the PowerShell Bug Bounty
This blog will be about setting up the combined MFA security information registration experience and […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about […]