Ru Campbell profile picture

Follow Ru

Ru Campbell

Petri Contributor

Ru (Ruairidh) Campbell is a Microsoft MVP and Microsoft security solutions architect, helping customers with security, compliance, identity, and modern device management. Specializing in Azure AD, Enterprise Mobility + Security, and Microsoft Defender, you can connect with Ru on Twitter @rucam365.

LATEST

Security

Five Tactics Towards Achieving Zero Trust with Azure Active Directory

Last Update: Feb 01, 2024

For any modern enterprise that uses Azure Active Directory (now Microsoft Entra ID) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for…

View Article

Understanding Microsoft Defender for Endpoint and How It Protects Your Data

Last Update: Sep 07, 2023

Microsoft Defender for Endpoint (MDE, previously known as Microsoft Defender Advanced Threat Protection) is Microsoft’s endpoint security platform that goes far and beyond the traditional anti-malware engine and firewall to protect against the modern cybersecurity threats an organization faces.  An evolving solution since it was first announced in 2016, MDE is part of the Microsoft…

View Article

How to Automatically Hybrid Azure AD Join and Intune Enroll PCs

Last Update: Jul 17, 2023

On-premises Active Directory domain-joined PCs have typically been managed with tools such as Group Policy.  At larger scales, you may have Configuration Manager or third-party tools.  The availability of Intune (part of Endpoint Manager) in Microsoft 365 subscriptions such as Business Premium and E3 has opened up an alternative.  The benefit many are seeing over…

View Article

Understanding Microsoft Information Protection

Last Update: Feb 08, 2023

There are a lot of compliance-based services across Microsoft 365’s licensing options. At the highest level, a Microsoft 365 E5 subscription for a tenant gives administrators a ton of toys to play with. The naming, marketing, and placement of the capabilities you get can be fuzzy. In this article, we’ll tackle Microsoft Information Protection (MIP),…

View Article
Cloud Computing

How to Package and Deploy Windows Applications with Intune

Last Update: Aug 31, 2022

Intune Administrators can deploy, make optionally available, or uninstall Win32 apps with the help of Windows 10’s Intune Management Extension (IME).  The IME is a service installed on Windows 10 that acts as the engine to execute these actions and, additionally, PowerShell scripts (which were originally its only purpose). Win32 apps in the context of…

View Article
Security

Understanding Microsoft Defender and its Many Layers

Last Update: Jul 01, 2022

Microsoft Defender has many layers and trying to understand all of the different components can be complex.

View Article

Guide: Limit Microsoft 365 Access to Corporate Devices with Conditional Access

Last Update: Jun 15, 2022

World events since March 2020 have highlighted one of the key benefits of Office 365 and cloud-based SaaS services in general: they are available any time, any place, on any device.  As the world was forced to work from home, Office 365 apps such as Teams, Outlook, SharePoint, and OneDrive could easily be accessed outwith…

View Article

How to Manage Local Administrators and Groups with Intune

Last Update: Apr 28, 2022

When we think about administrative rights on Intune-enrolled Windows 10 devices, we need to consider two possible device states for that device: Azure AD joined (AADJ), or Hybrid Azure AD joined (HAADJ).  This is due to the different administrative roles available at the directory level. For Azure AD joined devices, at the time of performing…

View Article

Guide: How to Plan for Microsoft Defender Endpoint Deployments and Migrations

Last Update: Apr 07, 2022

When approaching a rollout of Microsoft Defender for Endpoint (MDE) for your organization, it can be difficult to know where to start.  In my last article, MDE was explained at a high level: what it is and why you should care.  This time, we will get into the weeds of how to actually plan for…

View Article

Using Microsoft 365 Defender Threat Analytics to Improve Security

In this article, I’m going to describe how to use Microsoft 365 Defender Threat Analytics to improve security in your organization. Over three Petri articles, we’ve dived into what Microsoft Defender for Endpoint (MDE) is, how you can migrate to it, and how it should be configured. Part 1: Understanding Microsoft Defender for Endpoint and…

View Article
Go to page