This blog will discuss AADJ/Entra Joined vs. AADR/Entra Registered. It hopes this blog will provide […]
Those who wish me ADAL/MSAL
This blog will contain information about MSAL, ADAL, OAuth, and some tokens. I will also […]
The Quick and the PowerShell Bug Bounty
This blog will be about setting up the combined MFA security information registration experience and […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about […]
PowerShell: An unexpected Monitoring Journey
This short blog (but with a nice idea I hope and some PowerShell scripts) will […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and […]
65000 Days of Night
This time a very short blog about an Intune Settings Catalog profile and the Error […]
Quality Updates: International Preview of Mystery
This huge blog will be about deploying Quality Updates, the Update Health Tools, and an […]
Under the hoods of Device Control.
I guess it’s time for the sixth part of the Endpoint Security Series. This time, […]
What about Printer Drivers
After reading a question on the Technet community about how to deploy printers with their […]