Back Home

All we do is help IT
  • Home
  • Orders
  • Account details
  • Advertise
  • Mastermind Groups, Courses and more
  • ๐Ÿ‘‰ SellMyMSP: All stages M&A ๐Ÿ‘ˆ
  • Search
Back Home

  • Search
  • Home
  • Orders
  • Account details
  • Advertise
  • Mastermind Groups, Courses and more
  • ๐Ÿ‘‰ SellMyMSP: All stages M&A ๐Ÿ‘ˆ
coworkers taking a coffee break

Mentor Led Mastermind in person event

It’s been a long time since Third Tier did an in-person event. We did Brain Explosions years ago. […]

brown and black butterfly on gray rock during daytime

Attack Surface Reduction = Zero Day Protection

Attack Surface Reduction (ASR) rules have expanded to include a full range of zero-day protections. If you aren't using them today or haven't tried to use them recently, then it's time to look again. If you aren't locking down Windows natively then you're missing out on critical security features.

marketing man people laptop

What is Defender Anti-Virus Troubleshooting mode?

The real purpose of Troubleshooting Mode, then is for you to document changes that you need to make to the organizational policy for Defender for the affect machines.

a human is playing tug of war with an eager white golden retriever both fully engaged in the fun game

Don’t change the threat actions in anti-virus policy

Students in the Defender XDR course were advised not to alter threat actions in their anti-virus policy, leaving them as Not configured. This allows Defender to use its default behaviors, local device settings, signature-defined actions, and automatic remediation. Relying on Microsoft's security expertise ensures optimal threat management.

Why can’t AI image generators spell?

AI imaging tools like DALL-E, Midjourney, and Stable Diffusion often struggle with spelling correctly in generated images for several key reasons

cats in the garden

Understanding Standard and Strict Preset policies in Defender for Office

Defender for Office has a new way of making it easy for you to deploy policies. Instead of […]

red yellow and black bouy on body of water during daytime

Receive an alert when a message is released from quarantine

Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.

a bowler playing bowling

Assign email quarantine management responsibility

It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.

Sympathy flower

The Crowdstrike situation was your MSPs opportunity to exhibit leadership

An MSP may consider themselves to be doing a good job when calls for help are answer quickly and there are few of them. But your client probably doesn't view it that way.

My Prime Day favorite things (not Oprah)

Prime Day is coming soon. I hesitated to do this because I’m not a product hawker and I’m […]

an artist s illustration of artificial intelligence ai this image depicts the process used by text to image diffusion models it was created by linus zoll as part of the visualising ai

Blocking and monitoring generative AI in your network

Oh, my AI, what can be done? There’s lot of FUD (fear, uncertainty, and doubt) being spewed from […]

MSP question of the week: Strategies for Determining Employee Compensation

from theย SMB Community Podcast Determining the right amount of compensation for employees is a complex issue that many […]

ยฉ 2025 – All rights reserved

Designed with Customizr Pro