In one of my older blogs, I talked a lot about how and why you […]
Sandbox: Multiverse of Madness
In the rapidly evolving world of IT management, staying ahead of potential issues before they […]
Last PID.txt Standing
This time, a small blog about the PID.txt. This blog will show you that reinstalling […]
The Battle Between Entra Joined and Entra Registered devices
This blog will discuss AADJ/Entra Joined vs. AADR/Entra Registered. It hopes this blog will provide […]
Those who wish me ADAL/MSAL
This blog will contain information about MSAL, ADAL, OAuth, and some tokens. I will also […]
The Quick and the PowerShell Bug Bounty
This blog will be about setting up the combined MFA security information registration experience and […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about […]
PowerShell: An unexpected Monitoring Journey
This short blog (but with a nice idea I hope and some PowerShell scripts) will […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and […]
65000 Days of Night
This time a very short blog about an Intune Settings Catalog profile and the Error […]