Endpoint Protection

  • Blog
  • Endpoint Protection
Cloud Computing

Microsoft Defender for Cloud Apps Now Tracks Unauthorized SaaS Apps on macOS

Microsoft has released an update for its Defender for Cloud Apps, extending its Shadow IT discovery capabilities to macOS devices. This enhancement enables organizations to monitor and manage unauthorized SaaS applications on Mac machines. What is Shadow IT? Shadow IT refers to the use of technology systems, software, applications, services, and devices without the IT...

Last Update: Sep 09, 2024

LATEST

Microsoft Defender for Cosmos DB is Now Available in Public Preview

Last Update: Sep 04, 2024

Microsoft has announced the public preview of Microsoft Defender for Azure Cosmos DB, a new database protection solution for enterprise customers. The latest security offering allows organizations to constantly monitor and protect their cloud workloads against the most common critical threats across databases. “The new cloud workload protection capabilities are designed as an Azure-native layer…

View Article

PDQ Acquires Endpoint Management Solution Provider SmartDeploy

Last Update: Sep 04, 2024

PDQ has announced today the acquisition of SmartDeploy, a Seattle-based provider of modern endpoint management solutions. The company plans to leverage SmartDeploy’s technology to improve its value proposition by providing seamless endpoint management solutions for IT professionals. “We’re fortunate to team up with SmartDeploy,” explained Jaren Nichols, CRO of PDQ.com. “Our customers passionately endorse SmartDeploy’s…

View Article

Microsoft Defender for Endpoint Pricing Plans

Last Update: Sep 04, 2024

Microsoft recently announced that Microsoft Defender for Endpoint will soon be available in two plans: P1 and P2. In this article, I will look at how the two plans compare. With Windows, MacOS, iOS, and Android devices being the most common target for cyber criminals, malware and threats are continuously improving and evolving. In the…

View Article

How to Customize Endpoint Security Settings in Microsoft Intune

Last Update: Sep 04, 2024

In this article, I’m going to show you how to customize endpoint security settings in Microsoft Intune. Including how to change security baseline settings, how to make sure devices are running a specific operating system version (or later), and how to configure Windows and iOS disk encryption settings. Microsoft provides a series of recommended security…

View Article

How to Create a Compliance Policy in Microsoft Intune

Last Update: Sep 04, 2024

In this article, I’m going to show you how to create a compliance policy in Intune, Microsoft’s Mobile Device Management (MDM) solution, that restricts access to resources to cloud managed and compliant devices only. Even if your devices are registered or joined to Azure Active Directory (AD), there are still risks that could lead to…

View Article

How to Enable Windows Hello for Business

Last Update: Sep 04, 2024

In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login….

View Article

How to Join Windows 10 to Azure Active Directory

Last Update: Sep 04, 2024

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10…

View Article

How to Register Windows 10 with Azure Active Directory

Last Update: Sep 04, 2024

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to register Windows 10 with Azure Active Directory. You will 1) register a Windows 10 device…

View Article

Guide: Getting Started with Zero Trust Security in Microsoft 365

Last Update: Sep 04, 2024

Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…

View Article
Security

Microsoft Defender XDR Gets New Copilot for Security Integration for Enhanced Threat Intelligence

Microsoft has announced the general availability of the Copilot for Security threat intelligence (TI) embedded experience in the Defender XDR portal. The new AI-powered tool is designed to contextualize and summarize intelligence from Microsoft Defender Threat Intelligence (MDTI) and threat analytics. The new Microsoft Copilot for Security TI embedded experience enables customers to access and…

View Article
Security

Microsoft Defender for Endpoint Rolls Out Offline Security Intelligence Update Feature for Linux Devices

Microsoft Defender for Endpoint has added a new Offline Security Intelligence Update feature in public preview for Linux devices. This functionality enables organizations to update security intelligence even when internet connectivity is limited or unavailable, by utilizing a local hosting server. Microsoft has highlighted several key benefits of the new offline security intelligence update feature…

View Article
Go to page