Allowing the Sonos app via an Intune Firewall configuration
Your office just got some new speakers, but you can’t get the Windows app to talk to it? This serves as a dual guide, firstly on how to create and…
Your office just got some new speakers, but you can’t get the Windows app to talk to it? This serves as a dual guide, firstly on how to create and…
To most, the Center for Internet Security (CIS) are a provider of benchmarks and standards that one might wish to follow to increase the security of their IT environment. It’s…
With over 90% of business email compromise attacks originating from email, it makes sense to focus efforts on trying to reduce that line of entry… although first, you should lock…
It’s really hard to know where to start when you or your team are assigned the task of securing the company from cyber threats. If you’ve been in the game…
Windows Autopatch is the single best way to stay on top of OS patching in your environment. If you have M365 E3 or E5, it’s well worth a look. This…
If it is your job to manage and secure Windows endpoints and you aren’t aware of ASR rules, you need to start moving towards learning what they are, then getting…
Whether you use Edge, Chrome, Firefox, or some other obscure browser, managing extensions is a crucial part of protecting your users and assets. Window Shopping There are over 150,000 web…
In one way or another, end-users sometimes find themselves as members of the built-in Administrators group on Windows. We can use Intune to clean that up, while retaining access for…
Defender for Endpoint comes in a few different flavours and editions and is available via many routes. This will explain them. Defender for Endpoint (for end-user computers) There are three…
Updated: 18/07/2024 Remote Monitoring and Management software is rife. In the early 2000s when Microsoft only really catered for large enterprise in this area, it left a gap in the…