Microsoft has released an update for its Defender for Cloud Apps, extending its Shadow IT discovery capabilities to macOS devices. This enhancement enables organizations to monitor and manage unauthorized SaaS applications on Mac machines. What is Shadow IT? Shadow IT refers to the use of technology systems, software, applications, services, and devices without the IT...
Last Update: Sep 09, 2024
Last Update: Sep 04, 2024
Microsoft has announced the public preview of Microsoft Defender for Azure Cosmos DB, a new database protection solution for enterprise customers. The latest security offering allows organizations to constantly monitor and protect their cloud workloads against the most common critical threats across databases. “The new cloud workload protection capabilities are designed as an Azure-native layer…
Last Update: Sep 04, 2024
PDQ has announced today the acquisition of SmartDeploy, a Seattle-based provider of modern endpoint management solutions. The company plans to leverage SmartDeploy’s technology to improve its value proposition by providing seamless endpoint management solutions for IT professionals. “We’re fortunate to team up with SmartDeploy,” explained Jaren Nichols, CRO of PDQ.com. “Our customers passionately endorse SmartDeploy’s…
Last Update: Sep 04, 2024
Microsoft recently announced that Microsoft Defender for Endpoint will soon be available in two plans: P1 and P2. In this article, I will look at how the two plans compare. With Windows, MacOS, iOS, and Android devices being the most common target for cyber criminals, malware and threats are continuously improving and evolving. In the…
Last Update: Sep 04, 2024
In this article, I’m going to show you how to customize endpoint security settings in Microsoft Intune. Including how to change security baseline settings, how to make sure devices are running a specific operating system version (or later), and how to configure Windows and iOS disk encryption settings. Microsoft provides a series of recommended security…
Last Update: Sep 04, 2024
In this article, I’m going to show you how to create a compliance policy in Intune, Microsoft’s Mobile Device Management (MDM) solution, that restricts access to resources to cloud managed and compliant devices only. Even if your devices are registered or joined to Azure Active Directory (AD), there are still risks that could lead to…
Last Update: Sep 04, 2024
In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login….
Last Update: Sep 04, 2024
Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10…
Last Update: Sep 04, 2024
Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to register Windows 10 with Azure Active Directory. You will 1) register a Windows 10 device…
Last Update: Sep 04, 2024
Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…
Microsoft has announced the general availability of the Copilot for Security threat intelligence (TI) embedded experience in the Defender XDR portal. The new AI-powered tool is designed to contextualize and summarize intelligence from Microsoft Defender Threat Intelligence (MDTI) and threat analytics. The new Microsoft Copilot for Security TI embedded experience enables customers to access and…
Microsoft Defender for Endpoint has added a new Offline Security Intelligence Update feature in public preview for Linux devices. This functionality enables organizations to update security intelligence even when internet connectivity is limited or unavailable, by utilizing a local hosting server. Microsoft has highlighted several key benefits of the new offline security intelligence update feature…