This blog is the ninth part of the Endpoint security series. It will be about implementing Credential Guard and some insights. While writing the blog I added some more important stuff I will divide this blog into […]
O Removable Storage, Where Art Thou?
I guess it’s time for the sixth part of the Endpoint Security Series. This time I will walk you through what Microsoft Defender Device Control is, how to configure it […]
WDAC or (the Unexpected Virtue of Device Guard)
This blog is the fourth part of the Endpoint Security Series and it will show you how to configure Windows Defender Application Control (WDAC), aka Device Guard. It could be […]
App Protection: Attack of the OS-Sharing
In one of my last blogs, I showed how you can set up multiple App protection profiles to make sure your managed and unmanaged IOS devices could receive the correct […]