In this blog, I will explain why it’s important to monitor OneDrive and show you […]
Locking Down Guest Users: Why It’s a Must for Your Entra ID Tenant
In this blog, we’ll explore why it’s absolutely critical to lock down guest user access […]
Thank you for Application Guard for Office apps.
This blog is the first part of the Endpoint Security Series. In this blog, I […]
Sensitivity Labels DLP’s Excellent Adventure
In this blog, I’ll be talking about using DLP in combination with sensitivity labels and […]
Things to block in Denver When You’re an IT Admin
In this updated guide, we’ll explore effective strategies for blocking access to administrative tools such […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know […]
The Men who stare at the AppLocker event log
In this blog, we’ll delve into the curious interplay between AppLocker, MSI installers, Intune, and […]
Reservoir update logs
Making sure your devices are up to date with the latest Microsoft updates is one of the […]
What Happened to Monitoring External Access to Your Office 365 Data?
Some time ago I wrote a blog about securing your data in which I described that […]
The Fellowship Of Group Labelling
Labelling your data with sensitivity labels is the way to go. Confidential data within your […]