Skip to content
  • Latest Posts
  • Contact
  • Buy Rudy Some Membeer
  • About Rudy

The Magnificent ASR Rules

Posted on: July 15, 2020November 12, 2024Privileged Access Workstation , Endpoint Security Series , Powershell

This blog is the third part of the Endpoint Security Series. It will be about the Attack Surface Reduction In this third post of the series, let’s tackle Attack Surface […]

There will be Office 365 Security

Posted on: July 10, 2020December 4, 2021Intune , Privileged Access Workstation

This blog will be about how to secure and harden your Office 365 Apps and maybe automate it with PowerShell. Nowadays everyone should be securing their Microsoft 365 Tenant, their […]

The Return of the Azure Ad Portal

Posted on: July 9, 2020December 6, 2021Privileged Access Workstation , Azure Ad , Securing Azure Ad Portal

Looking back at my blogs, I realized I didn’t tell you the whole story concerning restricting user access to the Azure AD portal. Last night I was talking to Nicola […]

The Azure AD portal strikes back

Posted on: July 7, 2020July 31, 2024Azure Ad , Privileged Access Workstation , Securing Azure Ad Portal

Reconnaissance is the first phase in hacking. It’s a systematic approach to gathering information about your target. It’s up to you to prevent access to the Azure AD administration portal. […]

Back to the Passwordless sign in.

Posted on: July 6, 2020August 1, 2024Privileged Access Workstation

Why do your user’s still need to enter their password every time they log in? Why? I say, go passwordless! Implementing passwordless MFA is the right choice for securing your […]

Lock, Stock and Office 365 ATP Automation

Posted on: July 2, 2020December 6, 2021Microsoft 365 Business , Powershell , Privileged Access Workstation

Securing your email with Office 365 Advanced Threat Protection (ATP) / Microsoft Defender for Office 365 is like putting a cage around your email. You might ask yourself: Why do we […]

The Forgotten Fruits of Securing your Windows Endpoints

Posted on: July 1, 2020September 7, 2024Privileged Access Workstation , Intune , Microsoft 365 Business
The Forgotten Fruits of Securing your Windows Endpoints

Securing your endpoints is essential to protect your systems from various security threats. This blog will walk you through the steps you need to take to ensure your endpoints are […]

Conditional Access, the Good, the Bad, and the Ugly

Posted on: June 26, 2020August 27, 2024Conditional Access , Privileged Access Workstation

What do I mean by this?  Conditional Access is an extremely powerful tool within the Microsoft 365 environment. Even when you implement just the basics, it provides your tenant with a security […]

Secure your data like it was Fort Knox

Posted on: June 24, 2020June 8, 2022Sensitivity Labels , Data Governance , Privileged Access Workstation

One thing is certain, you need to protect your (important) data at all costs. Otherwise, it could come back to haunt you. Luckily there are multiple options to protect your […]

Conditional Access “To Go”

Posted on: June 22, 2020December 6, 2021Conditional Access , Powershell , Privileged Access Workstation

This blog will be about automating your Conditional Access Rules with Powershell and some troubleshooting withe the new-AzureADMSCAPolicy command Last week I published an overview of the best Conditional Access […]

Posts pagination

Previous page Page 1 … Page 4 Page 5 Page 6 Next page

Categories

  • MMP-C
  • Attestation and Compliance Series
  • EPM
  • Declared Configuration Enrollment
  • Autopilot
  • WinDC
  • Intune
  • Continue to Sign in Prompt Part 2: Disable the DMA SSO Compliance
  • The “Continue to Sign in Prompt” That breaks the SSO
  • Declarative Device Management with Intune
  • Why Using a DEM Account for Windows Autopilot is a Bad Idea
  • Device Query for Multiple Devices, Device Inventory, and Single Device Query: Connecting the Dots
Theme Alaska Blog by Kantipur Themes