Endpoint Protection

  • Blog
  • Endpoint Protection

LATEST

Cloud Computing

Microsoft Defender for Endpoint Gets New Removable Storage Management Capabilities

Microsoft has introduced several new removable storage management features in Defender for Endpoint (MDE). The latest release makes it easier for organizations to protect removable storage devices on Windows PCs. More specifically, Microsoft Defender for Endpoint helps IT admins to control how employees read, write, and execute specific files on removable storage. For instance, it’s…

View Article
Security

Microsoft Defender for Endpoint to Enable Tamper Protection for All Customers

Microsoft Defender for Endpoint will soon turn on tamper protection by default for all existing enterprise customers. The tamper protection feature prevents malicious apps from making unwanted changes to important security configuration settings on Windows, Windows Server, and macOS. Microsoft introduced tamper protection in its enterprise endpoint security solution back in 2019. Currently, the feature…

View Article
Security

Microsoft Detects Raspberry Robin Windows Worm in Hundreds of Enterprise Networks

Microsoft has warned customers about a new high-risk worm called “Raspberry Robin” that is infecting Windows PCs. The software giant has privately informed some Microsoft Defender for Endpoint users that the malware has been discovered in hundreds of enterprise networks across various industries (via Bleeping Computer). The Red Canary cybersecurity researchers first discovered Raspberry Robin…

View Article
Security

Microsoft Launches New Endpoint Security Solution for Small Businesses

Last Update: Mar 11, 2022

Microsoft has announced the general availability of Microsoft Defender for Business, a new endpoint security offering designed for small and medium-sized businesses (SMBs). The new security offering was first unveiled at Ignite 2021, and it began rolling out in preview to select Microsoft 365 Business Premium customers back in December. Microsoft describes Microsoft Defender for…

View Article

Microsoft Defender for Cosmos DB is Now Available in Public Preview

Microsoft has announced the public preview of Microsoft Defender for Azure Cosmos DB, a new database protection solution for enterprise customers. The latest security offering allows organizations to constantly monitor and protect their cloud workloads against the most common critical threats across databases. “The new cloud workload protection capabilities are designed as an Azure-native layer…

View Article

PDQ Acquires Endpoint Management Solution Provider SmartDeploy

PDQ has announced today the acquisition of SmartDeploy, a Seattle-based provider of modern endpoint management solutions. The company plans to leverage SmartDeploy’s technology to improve its value proposition by providing seamless endpoint management solutions for IT professionals. “We’re fortunate to team up with SmartDeploy,” explained Jaren Nichols, CRO of PDQ.com. “Our customers passionately endorse SmartDeploy’s…

View Article

Microsoft Defender for Endpoint Pricing Plans

Microsoft recently announced that Microsoft Defender for Endpoint will soon be available in two plans: P1 and P2. In this article, I will look at how the two plans compare. With Windows, MacOS, iOS, and Android devices being the most common target for cyber criminals, malware and threats are continuously improving and evolving. In the…

View Article

How to Customize Endpoint Security Settings in Microsoft Intune

In this article, I’m going to show you how to customize endpoint security settings in Microsoft Intune. Including how to change security baseline settings, how to make sure devices are running a specific operating system version (or later), and how to configure Windows and iOS disk encryption settings. Microsoft provides a series of recommended security…

View Article

How to Create a Compliance Policy in Microsoft Intune

In this article, I’m going to show you how to create a compliance policy in Intune, Microsoft’s Mobile Device Management (MDM) solution, that restricts access to resources to cloud managed and compliant devices only. Even if your devices are registered or joined to Azure Active Directory (AD), there are still risks that could lead to…

View Article
Go to page