Select Page
TelemetryFinal.gif

LOG SENSOR AND TELEMETRY SERVICES IN ISOLATED NETWORK

Dear IT Pros, We knew that it is normal for Domain Controller and critical servers to be in isolated network without internet access. How could we provide the cloud-based, Azure log analytic services for these objects? The services could originate ... continue reading
Telemetry2.gif

LOG SENSOR AND TELEMETRY SERVICE IN ISOLATED NETWORK

Dear IT Pros, We knew that it is normal for Domain Controller and critical servers to be in isolated network without internet access. How could we provide the cloud-based, Azure log analytic services for these objects? The services could originate ... continue reading
WDAC.gif

Deploying Windows 10 Application Control Policy

Dear IT Pros, Today we discuss about All things about WDAC – Windows Defender Application Control. WDAC was introduced with Windows 10 and could be applied to Windows server 2016 and later, its older name is Configurable Code Integrity (CCI) ... continue reading
WDAG3.gif

Windows 10 – All Things About Application Guard

Hi IT Professionals, While working on a Customers ‘requests on Windows Defender Application Guard related to Microsoft Endpoint Manager – Attack Surface Reduction Policies, I could not find an up-to-date and detailed document from internet search. I have ended up ... continue reading
WDCFA.gif

Windows 10 Controlled Folder Access Event Search

Dear IT Pros, Ransomware acts with accessing to the files, folders and encrypting them, to respond against it, we need to enable the Windows Defender feature named “Controlled Folder Access” – WDCFA and monitor the Windows Defender Guard Events in ... continue reading
mbam.gif

MBAM Server Migration To Microsoft Endpoint Manager

Dear IT Pros, Today we discuss about MBAM's Bitlocker data migration to MEM Microsoft provides a range of flexible BitLocker management alternatives to meet organization’s needs, as follows: Cloud-based BitLocker management using Microsoft Endpoint Manager. On-premises BitLocker management using System ... continue reading
USB2.jpg

MEM – All Things About USB Drive Management and Troubleshooting

Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading
MDE1.jpg

MDE Antivirus Configuration Common Mistakes and Best Practice

_______________________________________________________ John Barbare and Tan Tran Dear IT Pros, We discuss about Microsoft Defender for Endpoint Antivirus Configuration, Policy and exclusion list in detail to avoid making the common mistakes and to apply the best practice to it. Best Practices ... continue reading
MigIE-Edge.gif

All Things Migration from Internet Explorer to Edge Chromium

Brandon Wilson & Tan Tran Hi IT Pros, We still get the questions about Internet Explorer migration to Edge Chromium once in a while, especially from Government Agency Customers, the questions usually related to the in-house legacy application’ compatibility and ... continue reading
MEM-CMcollection.jpg

MEM – Managing CM Collection in the Cloud Configuration and Troubleshooting

Dear IT pros, As you knew it, starting with Microsoft Endpoint Configuration Manager - MCM version 1906 (SCCM version 1906) you could enable co-management for Endpoint Manager -MEM (Intune) devices in the Azure Public Cloud, Azure US Government Cloud. The ... continue reading