After a nice talk with Yannick Van Landeghem, who made me aware of a “possible” […]
PAW: Love and Thunder
I guess after all the blogs I have written about Endpoint Security, I need to […]
Endpoint & Security, The Curse of the Were-Applocker
This blog will be all about the Endpoint Security series blogs I have written until […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and […]
Under the hoods of Device Control.
I guess it’s time for the sixth part of the Endpoint Security Series. This time, […]
WDAC or (the Unexpected Virtue of Device Guard)
This blog is the fourth part of the Endpoint Security Series. It will show you […]
App Protection: Attack of the OS-Sharing
In one of my last blogs, I showed how you can set up multiple App […]
Applocker on the Company Portal Express
This short blog will be about why baselines are very important and why you need […]
Public Desktop icons and Adminless: The far side of Intune
This short blog will explain why users don’t need admin permissions to delete public desktop […]