Defender for Office has a new way of making it easy for you to deploy policies. Instead of editing the default policy or creating your own you can now use one of the Presets. But what do they contain? Microsoft has published this handy chart. What does it mean when […]
Security
Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
It was my pleasure to introduce peer groups to Third Tier. In 2024, we’re introducing focused learning groups for Defender, Intune, Public speaking and more
Despite criminal masterminds and “security researchers” always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
Defense implies a reactionary approach. Prevention set the scene where ransomware can’t get you in the first place.
The Chrome version of Edge has a full set of Group Policy and Intune configuration options that can enhance security.
Once these two items have been set the ability of PlugX to take advantage of innocent people should be thwarted.
let’s say that you’ve come across a situation, and you want to remove a device from the network – remotely, while you investigate. Interestingly this device, need not be enrolled in Defender for Business. It can an unmanaged device to
Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We’ll take that analysis and implement a solution based upon it
I often get asked how we manage networks without an RMM tool and I always reply that we take full advantage and make use of what Microsoft has to offer. This type of rule is an example of that philosophy.