This blog is the fifth part of the Endpoint Security Series and will be about Microsoft Defender Exploit Protection. Just like always, I need to divide this blog into multiple […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be about enabling and configuring Microsoft/Windows Defender controlled folder access (CFA) in Intune. I guess when […]
Zero Trust Security Flow
Everything is about Zero trust security, you will need to implement it. There are a lot of articles written about zero-trust security the last few months. Some examples: Zero Trust […]
The Blind Event Log
This blog will be about why sometimes the Windows Microsoft Defender event log, does not show you everything you want! For example notifications about ASR rules! I will divide this […]