Endpoint Protection

  • Blog
  • Endpoint Protection

LATEST

Microsoft logo

Microsoft Defender for Endpoint Adds Device Isolation and Antivirus Scanning Support on Linux and macOS

Last Update: Aug 30, 2023

Microsoft Defender for Endpoint has announced that Device isolation and Antivirus scanning capabilities are now available in preview for macOS and Linux devices. The new response actions should help to protect organizations against security threats. The device isolation feature blocks the compromised device from connecting to the corporate network. Meanwhile, Microsoft Defender for Endpoint continues…

View Article

Guide: Getting Started with Zero Trust Security in Microsoft 365

Last Update: Aug 29, 2023

Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…

View Article
Security

Microsoft Defender for Endpoint Now Supports Mixed Licensing Scenarios

Microsoft has introduced support for mixed licensing in its Microsoft Defender for Endpoint solution. The new capability allows IT admins to control how licenses are applied to client devices in enterprise environments. Microsoft Defender for Endpoint is a security solution that provides threat detection and response capabilities to protect endpoints (such as laptops, computers, and…

View Article

How to Enable Windows Hello for Business

Last Update: Jul 24, 2023

In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login….

View Article

How to Register Windows 10 with Azure Active Directory

Last Update: Jul 17, 2023

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to register Windows 10 with Azure Active Directory. You will 1) register a Windows 10 device…

View Article

How to Join Windows 10 to Azure Active Directory

Last Update: Jul 17, 2023

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10…

View Article
Windows

Implementing Access Controls using Microsoft Intune

Implementing identity and access management processes is an effective way to protect sensitive corporate data. It allows organizations to regulate user access and prevent instances of identity theft, data breaches, and unauthorized access to confidential corporate information. In this article, we’ll detail how organizations can significantly minimize their exposure by controlling access privileges with Microsoft…

View Article
Security

Mitigating Identity-Related Risks With Windows Hello for Business and Seamless Single Sign-On (SSO)

These days, document theft and data siphoning are common for most ransomware gangs. Because digital theft is different from analog theft, digital security should be different from analog security. In this article, we’ll explore how Windows Hello for Business and seamless single sign-on (SSO) can help organizations to mitigate many identity-related risks. We’re holding on…

View Article
PowerShell

How to Create Conditional Access Policies using PowerShell

When working in a Microsoft 365 environment, IT pros can use Conditional Access policies to control access to their tenant. In this article, we’ll detail how to create Conditional Access policies using PowerShell instead of the graphical user interface, and why using PowerShell to do that can help you save some time Conditional Access policies…

View Article
Security

Microsoft Defender for Endpoint Gets New Zeek Integration to Detect Network-Based Threats

Microsoft has partnered with Corelight to add a new Zeek integration to its Defender for Endpoint solution. The new integration helps to reduce the time required to detect sophisticated network-based threats in enterprise environments. Zeek is an open-source tool that monitors network traffic packets to detect malicious activity within a network. Microsoft Defender for Endpoint…

View Article
Go to page