This blog will be all about the Endpoint Security series blogs I have written until now and why. If you haven’t read my blogs about it please do! 1.Why? Some […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about Windows Defender Exploit Guard Network Protection WDEG-NP. 1.Information about Network protection Microsoft Defender Exploit Guard […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and provide some insights. While writing the blog, I added some more important stuff. 1. Credential Guard and […]
Under the hoods of Device Control.
I guess it’s time for the sixth part of the Endpoint Security Series. This time, I will walk you through Microsoft Defender Device Control, how to configure it in Intune, […]
The Exploit Protection Between us
This blog is the fifth part of the Endpoint Security Series and will be about Microsoft Defender Exploit Protection. Just like always, I need to divide this blog into multiple […]
Microsoft Defender Application Guard
This blog is the fourth part of the Endpoint Security Series, and today, we’re diving into Microsoft Defender Application Guard (MDAG). A security feature so good, it’s had more names […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be about enabling and configuring Microsoft/Windows Defender controlled folder access (CFA) in Intune. I guess this […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I will show you, how to start deploying Microsoft Defender Application Guard for Office apps. Also, […]
The Windows Defender Firewall rises
This blog is the seventh part of the Endpoint Security Series. In it, I’ll explain how to deploy your Windows Defender firewall baseline policy rules into Intune. 1. Some Background […]
The Magnificent ASR Rules
This blog is the third part of the Endpoint Security Series. It will be about the Attack Surface Reduction In this third post of the series, let’s tackle Attack Surface […]