Endpoint Protection

  • Blog
  • Endpoint Protection

LATEST

Windows Logo

Microsoft Defender for Endpoint Eases Enrollment Requirements for Devices Managed via Intune

Last Update: Aug 30, 2023

Microsoft has announced some changes coming to the security settings management capabilities in Microsoft Defender for Endpoint this month. The company plans to remove the Azure Active Directory (AD) join or Hybrid Azure AD join enrollment requirement for Windows devices. Last year, Microsoft released a new feature called Security Management for Microsoft Defender for Endpoint….

View Article
Microsoft logo

Microsoft Defender for Endpoint Adds Device Isolation and Antivirus Scanning Support on Linux and macOS

Last Update: Aug 30, 2023

Microsoft Defender for Endpoint has announced that Device isolation and Antivirus scanning capabilities are now available in preview for macOS and Linux devices. The new response actions should help to protect organizations against security threats. The device isolation feature blocks the compromised device from connecting to the corporate network. Meanwhile, Microsoft Defender for Endpoint continues…

View Article
Security

Microsoft Defender for Endpoint Now Supports Mixed Licensing Scenarios

Microsoft has introduced support for mixed licensing in its Microsoft Defender for Endpoint solution. The new capability allows IT admins to control how licenses are applied to client devices in enterprise environments. Microsoft Defender for Endpoint is a security solution that provides threat detection and response capabilities to protect endpoints (such as laptops, computers, and…

View Article
Windows

Implementing Access Controls using Microsoft Intune

Implementing identity and access management processes is an effective way to protect sensitive corporate data. It allows organizations to regulate user access and prevent instances of identity theft, data breaches, and unauthorized access to confidential corporate information. In this article, we’ll detail how organizations can significantly minimize their exposure by controlling access privileges with Microsoft…

View Article
Security

Mitigating Identity-Related Risks With Windows Hello for Business and Seamless Single Sign-On (SSO)

These days, document theft and data siphoning are common for most ransomware gangs. Because digital theft is different from analog theft, digital security should be different from analog security. In this article, we’ll explore how Windows Hello for Business and seamless single sign-on (SSO) can help organizations to mitigate many identity-related risks. We’re holding on…

View Article
PowerShell

How to Create Conditional Access Policies using PowerShell

When working in a Microsoft 365 environment, IT pros can use Conditional Access policies to control access to their tenant. In this article, we’ll detail how to create Conditional Access policies using PowerShell instead of the graphical user interface, and why using PowerShell to do that can help you save some time Conditional Access policies…

View Article
Security

Microsoft Defender for Endpoint Gets New Zeek Integration to Detect Network-Based Threats

Microsoft has partnered with Corelight to add a new Zeek integration to its Defender for Endpoint solution. The new integration helps to reduce the time required to detect sophisticated network-based threats in enterprise environments. Zeek is an open-source tool that monitors network traffic packets to detect malicious activity within a network. Microsoft Defender for Endpoint…

View Article
Cloud Computing

Microsoft Defender for Endpoint Gets New Removable Storage Management Capabilities

Microsoft has introduced several new removable storage management features in Defender for Endpoint (MDE). The latest release makes it easier for organizations to protect removable storage devices on Windows PCs. More specifically, Microsoft Defender for Endpoint helps IT admins to control how employees read, write, and execute specific files on removable storage. For instance, it’s…

View Article
Security

Microsoft Defender for Endpoint to Enable Tamper Protection for All Customers

Microsoft Defender for Endpoint will soon turn on tamper protection by default for all existing enterprise customers. The tamper protection feature prevents malicious apps from making unwanted changes to important security configuration settings on Windows, Windows Server, and macOS. Microsoft introduced tamper protection in its enterprise endpoint security solution back in 2019. Currently, the feature…

View Article
Security

Microsoft Detects Raspberry Robin Windows Worm in Hundreds of Enterprise Networks

Microsoft has warned customers about a new high-risk worm called “Raspberry Robin” that is infecting Windows PCs. The software giant has privately informed some Microsoft Defender for Endpoint users that the malware has been discovered in hundreds of enterprise networks across various industries (via Bleeping Computer). The Red Canary cybersecurity researchers first discovered Raspberry Robin…

View Article
Go to page