In this blog, we’ll delve into the curious interplay between AppLocker, MSI installers, Intune, and […]
Reservoir update logs
Making sure your devices are up to date with the latest Microsoft updates is one of the […]
What Happened to Monitoring External Access to Your Office 365 Data?
Some time ago I wrote a blog about securing your data in which I described that […]
Basic Authentication and the Last Crusade
In this blog I’ll show you a new option to disable basic authentication protocols. As […]
Sherlock Holmes: A Game of Powershell
My second blog in just one day, but sometimes you get scared as hell! Today […]
No Country For Not Monitoring
SIEM (security information and event management) is a set of tools used to monitor, identify, […]
Microsoft and Solarwinds, the holy grail
Solarwinds announced a collaboration with Microsoft to enhance monitoring and management. And since we use […]
The Windows Defender Firewall rises
This blog is the seventh part of the Endpoint Security Series. In it, I’ll explain […]
The LAPS and the furious!
LAPS is a solution that makes sure you have unique administrator passwords on each device […]
Along came MCAS/MDCA Automation
This blog will show you, how you could import your Microsoft Cloud App security/ Microsoft […]