That plastic-like white back on your silver flagship iPhone looks awful. This might be the ugliest iPhone ever, and I’m seriously thinking about returning it purely because of the design.
That plastic-like white back on your silver flagship iPhone looks awful. This might be the ugliest iPhone ever, and I’m seriously thinking about returning it purely because of the design.
Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.
Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.
Modzero discovered a critical vulnerability in Synology’s "Active Backup for Microsoft 365" (ABM) that exposed sensitive cloud data.
Modzero discovered a critical vulnerability in Synology’s "Active Backup for Microsoft 365" (ABM) that exposed sensitive cloud data.
Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.
Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment.
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment.
In this video, I walk through the fundamentals of the Active Directory Tier Model — what it is, why it matters, and how it helps protect privileged accounts and critical assets in your Windows environment.
In this video, I walk through the fundamentals of the Active Directory Tier Model — what it is, why it matters, and how it helps protect privileged accounts and critical assets in your Windows environment.
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
In conditional access policies, it is possible to block device platforms. It is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
In conditional access policies, it is possible to block device platforms. It is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
Newly registered domains can be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is usually being developed for some time.
Newly registered domains can be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is usually being developed for some time.
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
Inbound SMTP DANE is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
Inbound SMTP DANE is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
Tamper Protection in MDE is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
Tamper Protection in MDE is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID.
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID.
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are several predefined categories to choose from. But first, you need to turn on report mode.
Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are several predefined categories to choose from. But first, you need to turn on report mode.
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
Microsoft Defender for Endpoint supports gradual rollout of all update types – Security Intelligence Updates, Engine Updates, and also Platform Updates.
Microsoft Defender for Endpoint supports gradual rollout of all update types – Security Intelligence Updates, Engine Updates, and also Platform Updates.
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.