Sometimes, a seemingly straightforward task becomes an unexpected troubleshooting adventure. In today’s story, we’re diving […]
Continuous Access Evaluation: Rise of the Claim challenge
Hi, Refresh tokens, Hi lag when Terminating users or setting a new password. Welcome continuous […]
MCAS: Judgement Day
This blog will be about how I broke my own Microsoft Cloud App Security instance. […]
The Man Who Shot Office Hardware Acceleration
This simple blog will explain why Outlook can be seriously lagging while typing. And I […]
Guardians of the Local Admin rights
Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m […]
The never-ending Command Prompt
This blog will be about some new ADMX-backed policies for MDM to block access to […]
Lost in Monitoring Onedrive
In this blog, I will explain why it’s important to monitor OneDrive and show you […]
Locking Down Guest Users: Why It’s a Must for Your Entra ID Tenant
In this blog, we’ll explore why it’s absolutely critical to lock down guest user access […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I […]
Sensitivity Labels DLP’s Excellent Adventure
In this blog, I’ll be talking about using DLP in combination with sensitivity labels and […]