Last Update: Aug 30, 2023
Microsoft Defender for Endpoint has announced that Device isolation and Antivirus scanning capabilities are now available in preview for macOS and Linux devices. The new response actions should help to protect organizations against security threats. The device isolation feature blocks the compromised device from connecting to the corporate network. Meanwhile, Microsoft Defender for Endpoint continues…
Last Update: Aug 29, 2023
Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…
Microsoft has introduced support for mixed licensing in its Microsoft Defender for Endpoint solution. The new capability allows IT admins to control how licenses are applied to client devices in enterprise environments. Microsoft Defender for Endpoint is a security solution that provides threat detection and response capabilities to protect endpoints (such as laptops, computers, and…
Last Update: Jul 24, 2023
In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login….
Last Update: Jul 17, 2023
Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to register Windows 10 with Azure Active Directory. You will 1) register a Windows 10 device…
Last Update: Jul 17, 2023
Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10…
Implementing identity and access management processes is an effective way to protect sensitive corporate data. It allows organizations to regulate user access and prevent instances of identity theft, data breaches, and unauthorized access to confidential corporate information. In this article, we’ll detail how organizations can significantly minimize their exposure by controlling access privileges with Microsoft…
These days, document theft and data siphoning are common for most ransomware gangs. Because digital theft is different from analog theft, digital security should be different from analog security. In this article, we’ll explore how Windows Hello for Business and seamless single sign-on (SSO) can help organizations to mitigate many identity-related risks. We’re holding on…
When working in a Microsoft 365 environment, IT pros can use Conditional Access policies to control access to their tenant. In this article, we’ll detail how to create Conditional Access policies using PowerShell instead of the graphical user interface, and why using PowerShell to do that can help you save some time Conditional Access policies…
Microsoft has partnered with Corelight to add a new Zeek integration to its Defender for Endpoint solution. The new integration helps to reduce the time required to detect sophisticated network-based threats in enterprise environments. Zeek is an open-source tool that monitors network traffic packets to detect malicious activity within a network. Microsoft Defender for Endpoint…