The Risky User report is useful sure, but wouldn’t it be better if you didn’t have to remember to see if any users have been flagged as Risky?
It’s an Attack Surface Reduction rule and it is exploited in the wild, so it’s import to close up this vulnerability to fileless attacks.
Where should you configure ASR rules? I had this question, so I asked a contact in Endpoint Management at Microsoft.
What do you do when MFA is required but you can’t login because MFA is required? Here are 5 solutions and I like the last one the best.
This is a collection of posts on Intune (Endpoint Manager)
This is a collection of my blog posts on how to do things in Entra ID (Azure AD)
Turning off Autoplay is a recommended policy in Endpoint Manager device configuration. It is recommended because it can prevent the automatic opening a files from any drive type
Until you know how something is supposed to be done, please don’t buy a tool to do that thing for you. Vendors aren’t crutches.
The other day while attempting to help someone and I ended up learning about destructive (the default) and non-destructive PIN reset for Window
We hold ourselves to a higher security standard than most of our clients because we have access to many companies. Attackers have shown that MSPs are a huge target.
Internally we use Azure AD P2 features to manage ourselves and automate employee permission and application assignments.