This blog will be about me experimenting with Conditional Access and with experimenting, I mean to change the JSON myself and upload it! Why? Just for fun and to include […]
Remote Wipe: The Next level
This blog will show you how you can wipe all devices even when you don’t have Intune (yet) 1. Introduction The power of remote wiping your device is great to […]
Birds of Printer Nightmares
When I started this blog, it was all about showing you the options you have when you want to make sure the end user (without admin permissions) can still install […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples you could automate would be the deployment of the Conditional Access Rules. Looking back at […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I will show you, how to start deploying Microsoft Defender Application Guard for Office apps. Also, […]
The Fellowship Of Group Labelling
Labelling your data with sensitivity labels is the way to go. Confidential data within your organization needs to be labelled with a proper sensitivity label. You can do this manually […]
Basic Authentication and the Last Crusade
In this blog I’ll show you a new option to disable basic authentication protocols. As most of you probably know, Microsoft is going to disable basic authentication for ActiveSync, PowerShell, […]
Sherlock Holmes: A Game of Powershell
My second blog in just one day, but sometimes you get scared as hell! Today at 13:00 AppLocker suddenly began blocking the famous psscriptpolicytest files on all our 2019 Remote […]
Along came MCAS/MDCA Automation
This blog will show you, how you could import your Microsoft Cloud App security/ Microsoft Defender for Cloud Apps template (MCAS/MDCA). You could import this template with all your pre-configured […]
The Magnificent ASR Rules
This blog is the third part of the Endpoint Security Series. It will be about the Attack Surface Reduction In this third post of the series, let’s tackle Attack Surface […]