Browsed by
Category: Privileged Access Workstation

This is the highest security configuration designed for extremely sensitive roles that would have a signficant or material impact on the organization if their account was compromised

O Removable Storage, Where Art Thou?

O Removable Storage, Where Art Thou?

I guess it’s time for the sixth part of the Endpoint Security Series. This time I will walk you through what Microsoft Defender Device Control is, how to configure it in Intune and how it works. I will divide this blog into 9 parts  Information about device control. Configuring Device Control in Intune Results of Blocking Specific Hardware Results of preventing Write Access Removable Storage Deploy printer protection on Windows Digger deeper Logging Removing/Changing the policy Conclusion 1.Information about device control  Microsoft Defender for…

Read More Read More

MDAC or (the Unexpected Virtue of Device Guard)

MDAC or (the Unexpected Virtue of Device Guard)

This blog is the fourth part of the Endpoint Security Series and it will show you how to configure Windows/Microsoft Defender Application Control(WDAC/MDAC), aka Device Guard.  It could be a great addition to securing your environment. I will divide this blog into multiple parts. MDAC/WDAC/Device Guard Explained Choosing between MDAC and Applocker How to configure MDAC Automatically with an Endpoint Protection Policy Manually with a CSP Monitoring / Testing/ Troubleshooting it Creating a golden Image Adding and merging policies The…

Read More Read More

App Protection: Attack of the OS-Sharing

App Protection: Attack of the OS-Sharing

In one of my last blogs, I showed how you can set up multiple App protection profiles to make sure your managed and unmanaged IOS devices could receive the correct app protection policy. In my opinion, you need to make sure you lower the security bar for the Managed/MDM Enrolled devices by changing the App Protection policies. You really don’t want well-behaved employees who enrolled their own devices, become angry about the security barriers, and finding another way to share…

Read More Read More

Applocker on the Company portal Express

Applocker on the Company portal Express

This short blog will be about why baselines are very important and why you need to keep them up to date. I am not talking about security baselines this time. What I will be talking about, is the app baseline you need to deploy to your users Windows 10 devices to make sure users can install apps on their own. It’s best practice to implement adminless. *Source: Microsoft Vulnerabilities Report 2021 | BeyondTrust (great report!!) Of course, nowadays users are…

Read More Read More