This blog is the third part of the Endpoint Security Series. It will be about the Attack Surface Reduction In this third post of the series, let’s tackle Attack Surface […]
Better Together
“Better Together” is the intended strategy for Microsoft Endpoint Manager Configuration Manager and Microsoft Azure for managing Windows 10 systems.
How I Learned to Stop Worrying and Love OneDrive
In the past, there have been quite a few sync problems with OneDrive. Luckily, this is a thing of the past now. In this article, we’ll explore why you should […]
There will be Office 365 Security
This blog will be about how to secure and harden your Office 365 Apps and maybe automate it with PowerShell. Nowadays everyone should be securing their Microsoft 365 Tenant, their […]
The Return of the Azure Ad Portal
Looking back at my blogs, I realized I didn’t tell you the whole story concerning restricting user access to the Azure AD portal. Last night I was talking to Nicola […]
The Azure AD portal strikes back
Reconnaissance is the first phase in hacking. It’s a systematic approach to gathering information about your target. It’s up to you to prevent access to the Azure AD administration portal. […]
Back to the Passwordless sign in.
Why do your user’s still need to enter their password every time they log in? Why? I say, go passwordless! Implementing passwordless MFA is the right choice for securing your […]
Once Upon a Time in the Automount of OneDrive Team Sites
In this blog, we’ll explore how to ensure your Team Sites are synced automatically to all your devices and will show up in your OneDrive. While Microsoft offers a solution, […]
Lock, Stock and Office 365 ATP Automation
Securing your email with Office 365 Advanced Threat Protection (ATP) / Microsoft Defender for Office 365 is like putting a cage around your email. You might ask yourself: Why do we […]
The Forgotten Fruits of Securing your Windows Endpoints
Securing your endpoints is essential to protect your systems from various security threats. This blog will walk you through the steps you need to take to ensure your endpoints are […]