Back Home

All we do is help IT
  • Home
  • Orders
  • Account details
  • Advertise
  • Mastermind Groups, Courses and more
  • 👉 SellMyMSP: All stages M&A 👈
  • Search
Back Home

  • Search
  • Home
  • Orders
  • Account details
  • Advertise
  • Mastermind Groups, Courses and more
  • 👉 SellMyMSP: All stages M&A 👈

Blog Topic and Posts

Business
Copilot
Defender XDR
Entra ID
Intune
coffee cup and glasses on a table

It’s now easy to send mail from an alias

You used to need an IT admin to help you get setup to send email from an alias. Somewhere along the way, this changed and now you can just send from an alias.

blue green and red abstract illustration

Include IPv6 in Azure AD policies

Criminals of the world would love to know that they don't have to deal with MFA if they phish you while you're in the office. Now we've taken that option away

white notebook and yellow pencil

Conclusions from reading threat analyst reports

Despite criminal masterminds and "security researchers" always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.

aircraft formation diamond airplanes

Ransomware prevention, not defense

Defense implies a reactionary approach. Prevention set the scene where ransomware can't get you in the first place.

dragonfly on the stick near spider web

Setup up automated investigation and response

Many vendors call this Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR). Microsoft calls it Defender for Business.

green tree

How to manage Office updates with Microsoft 365

It's one of the least known and used portal in the entire Microsoft 365 suite. Too bad, because it contains some configuration and automation gems. Let's see how we use it to automate Office updates.

tax documents on black table

Protect accounting firms from spreading malware via uploaded tax documents

Fortunately, Defender protects against this when configured correctly. In addition to the Defender for Endpoint sensor installation, Attack Surface Reduction rules and certain anti-virus configurations should also be deployed

white floral dcor

Configure security settings for Edge

The Chrome version of Edge has a full set of Group Policy and Intune configuration options that can enhance security.

unrecognizable black colleagues browsing laptop at table with face mask

Avoid PlugX malware

Once these two items have been set the ability of PlugX to take advantage of innocent people should be thwarted.

man raising his right arm

Disrupting Qakbot

All it took was an email attachment policy, a little hardening of Microsoft Office and the configuration of the built-in anti-virus software

person wearing white pants and white socks standing beside brown broom

How to isolate a device using Defender

let's say that you've come across a situation, and you want to remove a device from the network - remotely, while you investigate. Interestingly this device, need not be enrolled in Defender for Business. It can an unmanaged device to

The Frozen Wild Dnieper River

How to prevent weak MFA session token theft

Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We'll take that analysis and implement a solution based upon it

Posts navigation

  • Newer posts Newer posts
    • 1
    • …
    • 5
    • 6
    • 7
    • …
    • 18
  • Older posts Older posts

© 2025 – All rights reserved

Designed with Customizr Pro