After a nice talk with Yannick Van Landeghem, who made me aware of a “possible” security gap when using a Temporary Access Pass (TAP), I decided to write a blog […]
PAW: Love and Thunder
I guess after all the blogs I have written about Endpoint Security, I need to go talk about PAW/SAW not to be mixed up with PAW patrol or the SAW […]
Endpoint & Security, The Curse of the Were-Applocker
This blog will be all about the Endpoint Security series blogs I have written until now and why. If you haven’t read my blogs about it please do! 1.Why? Some […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about Windows Defender Exploit Guard Network Protection WDEG-NP. 1.Information about Network protection Microsoft Defender Exploit Guard […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and provide some insights. While writing the blog, I added some more important stuff. 1. Credential Guard and […]
Under the hoods of Device Control.
I guess it’s time for the sixth part of the Endpoint Security Series. This time, I will walk you through Microsoft Defender Device Control, how to configure it in Intune, […]
Microsoft Defender Application Guard
This blog is the fourth part of the Endpoint Security Series, and today, we’re diving into Microsoft Defender Application Guard (MDAG). A security feature so good, it’s had more names […]
App Protection: Attack of the OS-Sharing
In one of my last blogs, I showed how you can set up multiple App protection profiles to make sure your managed and unmanaged IOS devices could receive the correct […]
Applocker on the Company Portal Express
This short blog will be about why baselines are very important and why you need to keep them up to date. I am not talking about security baselines this time. […]
Public Desktop icons and Adminless: The far side of Intune
This short blog will explain why users don’t need admin permissions to delete public desktop icons. 1. Introduction When it comes to managing devices within an organization, many people assume […]