Browser Extension lockdown
Whether you use Edge, Chrome, Firefox, or some other obscure browser, managing extensions is a crucial part of protecting your users and assets. Window Shopping There are over 150,000 web…
Whether you use Edge, Chrome, Firefox, or some other obscure browser, managing extensions is a crucial part of protecting your users and assets. Window Shopping There are over 150,000 web…
In one way or another, end-users sometimes find themselves as members of the built-in Administrators group on Windows. We can use Intune to clean that up, while retaining access for…
Defender for Endpoint comes in a few different flavours and editions and is available via many routes. This will explain them. Defender for Endpoint (for end-user computers) There are three…
Updated: 18/07/2024 Remote Monitoring and Management software is rife. In the early 2000s when Microsoft only really catered for large enterprise in this area, it left a gap in the…
8 characters or more, some special, throw some numbers in there, and rotate often. Pretty much the standard advice for creating passwords for as long as computer systems have existed.…
As technology progresses, the idea is that our time as administrators is freed up so we can focus on other aspects of IT, such as cyber security. I’ve mentioned in…
Making the transition to Intune is a big challenge, especially if the way you’ve always provisioned computers has been to image them with MDT or Config Manager. With the end-of-life…
Like smartphones and desktop operating systems, one’s chosen web browser is always a topic of fierce emotional debate. It is very hard to convince someone to make the switch when…
Keeping Intune clean is how you keep the dashboards green. Most of you are here to copy/paste and get reports, so let’s get to it. This script uses the Microsoft…
This isn’t supposed to be a sales pitch, but an insight to how the single pane of glass approach can both fortify your company’s security posture while also being a…