Skip to content
  • Latest Posts
  • Contact
  • Buy Rudy Some Membeer
  • About Rudy

Under the Hood of: MDE Attach V2 / Security settings management

Posted on: July 18, 2023February 21, 2025Intune , Microsoft Defender , MMP-C
Under the Hood of: MDE Attach V2 / Security settings management

I will guide you through my MDE Attach V2 (Security Management) journey and explain which “service” delivers the Intune policies to your NOT AADJ (or Entra) Windows Server 2019.

Honeypot: The Last Reconnaissance

Posted on: September 17, 2021December 2, 2021Sharepoint , Cloud App Security , Microsoft Defender

After reading this fantastic article on the Technet Community about the Attack Kill Chain, I realized I still needed to get this blog out. This blog will be about how […]

This is Network Protection: The sort of Sequel to Exploit Protection

Posted on: July 29, 2021September 25, 2024Endpoint Security Series , Microsoft Defender , Privileged Access Workstation

This blog is the eighth part of the Endpoint Security series and will be about Windows Defender Exploit Guard Network Protection WDEG-NP. 1.Information about Network protection Microsoft Defender Exploit Guard […]

A Walk Among the Credential Guards

Posted on: July 19, 2021September 24, 2024Privileged Access Workstation , Endpoint Security Series , Microsoft Defender , Windows 10

This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and provide some insights. While writing the blog, I added some more important stuff. 1. Credential Guard and […]

The Exploit Protection Between us

Posted on: June 22, 2021August 13, 2024Endpoint Security Series , Microsoft Defender

This blog is the fifth part of the Endpoint Security Series and will be about Microsoft Defender Exploit Protection. Just like always, I need to divide this blog into multiple […]

Married with Controlled Folder Access(CFA)

Posted on: June 15, 2021July 27, 2024Microsoft Defender , Endpoint Security Series

This blog is the second part of the Endpoint Security series. This part will be about enabling and configuring Microsoft/Windows Defender controlled folder access (CFA) in Intune. I guess this […]

Zero Trust Security Flow

Posted on: January 14, 2021August 1, 2024Conditional Access , Intune , Microsoft 365 Business , Microsoft Defender , Microsoft Teams , Onedrive , Powershell , Privileged Access Workstation , Sensitivity Labels , Solarwinds

Everything is about Zero trust security; you will need to implement it.  Many articles have been written about zero-trust security in the last few months. Some examples: Zero Trust Security […]

The Blind Event Log

Posted on: October 27, 2020March 17, 2022Privileged Access Workstation , Microsoft Defender

This blog will be about why sometimes the Windows Microsoft Defender event log, does not show you everything you want! For example notifications about ASR rules! I will divide this […]

Interview with the ASR rules

Posted on: August 19, 2020December 10, 2024Microsoft 365 Business , Intune , Microsoft Defender , Privileged Access Workstation

Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know the caveats. The sun was probably shining when you configured your ASR rules! After deciding […]

Categories

  • MMP-C
  • Attestation and Compliance Series
  • EPM
  • Declared Configuration Enrollment
  • Autopilot
  • WinDC
  • Intune
  • Continue to Sign in Prompt Part 2: Disable the DMA SSO Compliance
  • The “Continue to Sign in Prompt” That breaks the SSO
  • Declarative Device Management with Intune
  • Why Using a DEM Account for Windows Autopilot is a Bad Idea
  • Device Query for Multiple Devices, Device Inventory, and Single Device Query: Connecting the Dots
Theme Alaska Blog by Kantipur Themes