This time, a blog about how to automate your deployment of Proactive Remediation scripts and, […]
The Exploit Protection Between us
This blog is the fifth part of the Endpoint Security Series and will be about […]
Microsoft Defender Application Guard
This blog is the fourth part of the Endpoint Security Series, and today, we’re diving […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be […]
Those Magnificent Drivers in Their Flying Microsoft Store, Or How I Flew From The Enrollment Status Page To Paris in 25 hours 11 minutes
In this post, we’ll explore the issue of the Autopilot Account Setup page getting stuck […]
External sender tagging: “Dumb & Dumber”
So, this is my first blog post. In it, I’ll highlight the new built-in external […]
Let the Right Chromebook in
This blog will be about Chromebooks and MAM. I will also introduce a colleague of […]
Blood, Sweat, and built-in compliance policy
This time a blog without me doing some shoveling but only some explanation about some […]
Cloudy: With a chance of Winget
This blog will be about my experiences with the Windows Package Manager, also known as […]
Microsoft Edge: And the Fantabulous Security of One Browser
This time, a simple blog about creating a Microsoft Edge Security baseline with the Settings […]