It’s one of the least known and used portal in the entire Microsoft 365 suite. Too bad, because it contains some configuration and automation gems. Let’s see how we use it to automate Office updates.
endpoint manager
Fortunately, Defender protects against this when configured correctly. In addition to the Defender for Endpoint sensor installation, Attack Surface Reduction rules and certain anti-virus configurations should also be deployed
Once these two items have been set the ability of PlugX to take advantage of innocent people should be thwarted.
All it took was an email attachment policy, a little hardening of Microsoft Office and the configuration of the built-in anti-virus software
It’s an Attack Surface Reduction rule and it is exploited in the wild, so it’s import to close up this vulnerability to fileless attacks.
Where should you configure ASR rules? I had this question, so I asked a contact in Endpoint Management at Microsoft.
This is a collection of posts on Microsoft Endpoint Manager
The other day while attempting to help someone and I ended up learning about destructive (the default) and non-destructive PIN reset for Window
Instead of simply computer or user group policies, we have now have policies and profiles of both device and user types and we can assign the user policies to devices and device policies to users. Sound confusing and it is. The choice is now yours to make but how to you make that decision?
Microsoft is calling this modern management. Ready to begin the transformation?