I will guide you through my MDE Attach V2 (Security Management) journey and explain which “service” delivers the Intune policies to your NOT AADJ (or Entra) Windows Server 2019.
Honeypot: The Last Reconnaissance
After reading this fantastic article on the Technet Community about the Attack Kill Chain, I realized I still needed to get this blog out. This blog will be about how […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about Windows Defender Exploit Guard Network Protection WDEG-NP. 1.Information about Network protection Microsoft Defender Exploit Guard […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and provide some insights. While writing the blog, I added some more important stuff. 1. Credential Guard and […]
The Exploit Protection Between us
This blog is the fifth part of the Endpoint Security Series and will be about Microsoft Defender Exploit Protection. Just like always, I need to divide this blog into multiple […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be about enabling and configuring Microsoft/Windows Defender controlled folder access (CFA) in Intune. I guess this […]
Zero Trust Security Flow
Everything is about Zero trust security; you will need to implement it. Â Many articles have been written about zero-trust security in the last few months. Some examples: Zero Trust Security […]
The Blind Event Log
This blog will be about why sometimes the Windows Microsoft Defender event log, does not show you everything you want! For example notifications about ASR rules! I will divide this […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know the caveats. The sun was probably shining when you configured your ASR rules! After deciding […]