Zero Trust Workshop: Your Security Roadmap
It’s really hard to know where to start when you or your team are assigned the task of securing the company from cyber threats. If you’ve been in the game…
It’s really hard to know where to start when you or your team are assigned the task of securing the company from cyber threats. If you’ve been in the game…
** UPDATE March 31st: Autopatch is now included in Business Premium and Education SKUs, you’ve got no excuses** Windows Autopatch is the single best way to stay on top of…
If it is your job to manage and secure Windows endpoints and you aren’t aware of ASR rules, you need to start moving towards learning what they are, then getting…
Whether you use Edge, Chrome, Firefox, or some other obscure browser, managing extensions is a crucial part of protecting your users and assets. Window Shopping There are over 150,000 web…
In one way or another, end-users sometimes find themselves as members of the built-in Administrators group on Windows. We can use Intune to clean that up, while retaining access for…
Defender for Endpoint comes in a few different flavours and editions and is available via many routes. This will explain them. Defender for Endpoint (for end-user computers) There are three…
Updated: 18/07/2024 Remote Monitoring and Management software is rife. In the early 2000s when Microsoft only really catered for large enterprise in this area, it left a gap in the…
8 characters or more, some special, throw some numbers in there, and rotate often. Pretty much the standard advice for creating passwords for as long as computer systems have existed.…
As technology progresses, the idea is that our time as administrators is freed up so we can focus on other aspects of IT, such as cyber security. I’ve mentioned in…
Making the transition to Intune is a big challenge, especially if the way you’ve always provisioned computers has been to image them with MDT or Config Manager. With the end-of-life…