Protecting your devices with Microsoft Defender ASR rules is best practice but… make sure you’re aware of the caveats. The sun was probably shining when you configured your ASR rules! […]
The Men who stare at the AppLocker event log
This short blog will be about the curious cage of AppLocker, MSI, Intune and the event log. I will divide this blog into multiple parts Introduction to Applocker Opening an […]
Reservoir update logs
Making sure your devices are up to date with the latest Microsoft updates is one of the key pillars of hardening your endpoints. Updating your devices through Intune is a piece of cake. […]
What Happened to Monitoring External Access to Your Office 365 Data?
Some time ago I wrote a blog about securing your data in which I described that this is only the first step in making sure your data is safe. I will […]