This blog will show you how you can wipe all devices even when you don’t […]
Birds of Printer Nightmares
When I started this blog, it was all about showing you the options you have […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples […]
A million ways to implement ISO 27001 controls.
After being inspired by Alexander Fields about the CIS framework and Microsoft 365, I took […]
Guardians of the Local Admin rights
Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m […]
The never-ending Command Prompt
This blog will be about some new ADMX-backed policies for MDM to block access to […]
The Place Beyond the Guests
This blog shows you why it’s really important that you don’t forget to lock down […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I […]
Things to block in Denver When You’re an IT Admin
In this updated guide, we’ll explore effective strategies for blocking access to administrative tools such […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know […]