This blog will show you how you can wipe all devices even when you don’t have Intune (yet) 1. Introduction The power of remote wiping your device is great to […]
Birds of Printer Nightmares
When I started this blog, it was all about showing you the options you have when you want to make sure the end user (without admin permissions) can still install […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples you could automate would be the deployment of the Conditional Access Rules. Looking back at […]
A million ways to implement ISO 27001 controls.
After being inspired by Alexander Fields about the CIS framework and Microsoft 365, I took a deep dive into mapping ISO 27001 to a zero-trust modern workplace. I’ll try to […]
Guardians of the Local Admin rights
Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m joking, no it’s not! I must be saying this a lot lately. You need to […]
The never-ending Command Prompt
This blog will be about some new ADMX-backed policies for MDM to block access to the Command Prompt (DisableCMD). After trying them out, I encountered some weird behavior. 1. Introduction […]
Locking Down Guest Users: Why It’s a Must for Your Entra ID Tenant
In this blog, we’ll explore why it’s absolutely critical to lock down guest user access in your Entra ID tenant. Without proper restrictions, guest users could potentially access sensitive information, […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I will show you, how to start deploying Microsoft Defender Application Guard for Office apps. Also, […]
Things to block in Denver When You’re an IT Admin
In this updated guide, we’ll explore effective strategies for blocking access to administrative tools such as Regedit (Block Regedit), the Command Prompt (Block CMD), and PowerShell (Block PowerShell). We’ll break […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know the caveats. The sun was probably shining when you configured your ASR rules! After deciding […]