This is a collection of posts about Microsoft Defender. How to set, configure, troubleshoot and implement.
This is a collection of posts on Microsoft Endpoint Manager
This is a collection of my blog posts on how to do things in Azure Active Directory
What is holding your business back? Let’s pick one issue and solve it. You’ll be amazed at how this invigorates your business.
If you are struggling with how to make connections to local prospects, then this paper is for you. I show you exactly how to do it in LinkedIn
I realized that type of person that I needed to hire, how to recognize them, and how to cultivate any short comings that they had.
A + address is a temporary email address that you create for some specific purpose.
You used to need an IT admin to help you get setup to send email from an alias. Somewhere along the way, this changed and now you can just send from an alias.
Criminals of the world would love to know that they don’t have to deal with MFA if they phish you while you’re in the office. Now we’ve taken that option away
Despite criminal masterminds and “security researchers” always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
Defense implies a reactionary approach. Prevention set the scene where ransomware can’t get you in the first place.
Many vendors call this Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR). Microsoft calls it Defender for Business.
It’s one of the least known and used portal in the entire Microsoft 365 suite. Too bad, because it contains some configuration and automation gems. Let’s see how we use it to automate Office updates.
Fortunately, Defender protects against this when configured correctly. In addition to the Defender for Endpoint sensor installation, Attack Surface Reduction rules and certain anti-virus configurations should also be deployed
The Chrome version of Edge has a full set of Group Policy and Intune configuration options that can enhance security.