In this updated guide, we’ll explore effective strategies for blocking access to administrative tools such […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know […]
The Men who stare at the AppLocker event log
In this blog, we’ll delve into the curious interplay between AppLocker, MSI installers, Intune, and […]
Reservoir update logs
Making sure your devices are up to date with the latest Microsoft updates is one of the […]
What Happened to Monitoring External Access to Your Office 365 Data?
Some time ago I wrote a blog about securing your data in which I described that […]
The Fellowship Of Group Labelling
Labelling your data with sensitivity labels is the way to go. Confidential data within your […]
Basic Authentication and the Last Crusade
In this blog I’ll show you a new option to disable basic authentication protocols. As […]
Sherlock Holmes: A Game of Powershell
My second blog in just one day, but sometimes you get scared as hell! Today […]
No Country For Not Monitoring
SIEM (security information and event management) is a set of tools used to monitor, identify, […]
Microsoft and Solarwinds, the holy grail
Solarwinds announced a collaboration with Microsoft to enhance monitoring and management. And since we use […]