Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m […]
The never-ending Command Prompt
This blog will be about some new ADMX-backed policies for MDM to block access to […]
Things to block in Denver When You’re an IT Admin
In this updated guide, we’ll explore effective strategies for blocking access to administrative tools such […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know […]
The Fellowship Of Group Labelling
Labelling your data with sensitivity labels is the way to go. Confidential data within your […]
No Country For Not Monitoring
SIEM (security information and event management) is a set of tools used to monitor, identify, […]
Microsoft and Solarwinds, the holy grail
Solarwinds announced a collaboration with Microsoft to enhance monitoring and management. And since we use […]
Lock, Stock and Office 365 ATP Automation
Securing your email with Office 365 Advanced Threat Protection (ATP) / Microsoft Defender for Office […]
The Forgotten Fruits of Securing your Windows Endpoints
Securing your endpoints is essential to protect your systems from various security threats. This blog […]
My first blogpost :)
I have been thinking a lot about creating a website and to start blogging. The […]