Browsed by
Category: Endpoint Security Series

The Exploit Protection Between us

The Exploit Protection Between us

This blog is the fifth part of the Endpoint Security Series and will be about Microsoft Defender Exploit Protection. Just like always, I need to divide this blog into multiple parts, so we can get a good understanding of what Exploit Protection is and how it works or doesn’t work Information about Exploit Protection First Look at Exploit Protection Deploy it with a Security Baseline? Configure EP in Intune Checking the configuration Event Logging Testing it! Removing EP! Conclusion 1.   …

Read More Read More

MDAC or (the Unexpected Virtue of Ignorance)

MDAC or (the Unexpected Virtue of Ignorance)

This blog is the fourth part of the Endpoint Security Series and it will show you how to configure Windows/Microsoft Defender Application Control(WDAC/MDAC).  It could be a great addition to securing your environment. I will divide this blog into multiple parts. MDAC/WDAC/Device Guard Explained Choosing between MDAC and Applocker How to configure MDAC Automatically with an Endpoint Protection Policy Manually with a CSP Monitoring / Testing/ Troubleshooting it Creating a golden Image Adding and merging policies The Microsoft Store/Blocking Apps…

Read More Read More

Married with Controlled Folder Access(CFA)

Married with Controlled Folder Access(CFA)

This blog is the second part of the Endpoint Security series. This part will be about enabling and configuring Microsoft/Windows Defender controlled folder access (CFA) in Intune. I guess when you haven’t implemented Applocker, this feature can be of good use to you. I decided to create this blog after a question on the Discord WinAdmin/Intune channel on how to exclude the Onedrive Process. I am going to divide this blog into several parts. Introduction Event Logging Enabling Controlled Folders…

Read More Read More

Thank you for Application Guard for Office apps.

Thank you for Application Guard for Office apps.

This blog is the first part of the Endpoint Security Series. In this blog, I will show you, how to start testing with Application Guard for Office apps. I will divide this blog into 5 parts. Information About WDAG Deploy it with Intune Endpoint Security Deploy it with PowerShell Results Conclusion 1. Information About Windows Defender Application Guard (WDAG) To make sure Malware can’t get their foot in the door, you have to protect your endpoint. Hardening your Office apps…

Read More Read More