This is a collection of my posts about running an MSP and successful business strategy and theory.
A list of our blog posts on Copilot. Start with Outlook and move through the entire suite at your pace.
This is a collection of posts about Microsoft Defender. How to set, configure, troubleshoot and implement.
This is a collection of posts on Intune (Endpoint Manager)
This is a collection of my blog posts on how to do things in Entra ID (Azure AD)
It’s been a long time since Third Tier did an in-person event. We did Brain Explosions years ago. Now we’re bringing together the Masterminds. For the last two years, we’ve been holding Mentor-led Mastermind groups for solopreneurs, small firms and large firms each grouped by size to focus the content […]
Attack Surface Reduction (ASR) rules have expanded to include a full range of zero-day protections. If you aren’t using them today or haven’t tried to use them recently, then it’s time to look again. If you aren’t locking down Windows natively then you’re missing out on critical security features.
The real purpose of Troubleshooting Mode, then is for you to document changes that you need to make to the organizational policy for Defender for the affect machines.
Students in the Defender XDR course were advised not to alter threat actions in their anti-virus policy, leaving them as Not configured. This allows Defender to use its default behaviors, local device settings, signature-defined actions, and automatic remediation. Relying on Microsoft’s security expertise ensures optimal threat management.
AI imaging tools like DALL-E, Midjourney, and Stable Diffusion often struggle with spelling correctly in generated images for several key reasons
Defender for Office has a new way of making it easy for you to deploy policies. Instead of editing the default policy or creating your own you can now use one of the Presets. But what do they contain? Microsoft has published this handy chart. What does it mean when […]
Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.
An MSP may consider themselves to be doing a good job when calls for help are answer quickly and there are few of them. But your client probably doesn’t view it that way.
Prime Day is coming soon. I hesitated to do this because I’m not a product hawker and I’m really not a gadget person. I know that’s weird for an IT pro. But in the end, I decided to share a few things that might go on sale. And something fun […]