This short blog (but with a nice idea I hope and some PowerShell scripts) will […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and […]
65000 Days of Night
This time a very short blog about an Intune Settings Catalog profile and the Error […]
Quality Updates: International Preview of Mystery
This huge blog will be about deploying Quality Updates, the Update Health Tools, and an […]
Under the hoods of Device Control.
I guess it’s time for the sixth part of the Endpoint Security Series. This time, […]
What about Printer Drivers
After reading a question on the Technet community about how to deploy printers with their […]
Proactive Remediations: Lost in PowerShell
This time, a blog about how to automate your deployment of Proactive Remediation scripts and, […]
The Exploit Protection Between us
This blog is the fifth part of the Endpoint Security Series and will be about […]
Microsoft Defender Application Guard
This blog is the fourth part of the Endpoint Security Series, and today, we’re diving […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be […]