This blog is the fifth part of the Endpoint Security Series and will be about Microsoft Defender Exploit Protection. Just like always, I need to divide this blog into multiple […]
WDAC or (the Unexpected Virtue of Device Guard)
This blog is the fourth part of the Endpoint Security Series and it will show you how to configure Windows Defender Application Control (WDAC), aka Device Guard. It could be […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be about enabling and configuring Microsoft/Windows Defender controlled folder access (CFA) in Intune. I guess when […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I will show you, how to start deploying Microsoft Defender Application Guard for Office apps. Also, […]