Select Page
WhatsNew.png

New features of Windows Server 2022 Failover Clustering

Greetings again Windows Server and Failover Cluster fans!! John Marlin here and I own the Failover Clustering feature within the Microsoft product team. In this blog, I will be giving an overview of the new features in Windows Server 2022 ... continue reading
Introduction to Secured-core computing

Introduction to Secured-core computing

Security is a broad topic that has components across all layers of the technology stack. Lately I’ve been investigating the concept of Secured-core computing, available with hardware from OEM providers running Windows 10 and now also Windows Server 2022 (preview) ... continue reading

Windows 11 enables security by design from the chip to the cloud

Over the last year, PCs have kept us connected to family, friends, and enabled businesses to continue to run. This new hybrid work paradigm has got us thinking about how we will continue to deliver the best possible quality, experience, ... continue reading
Group Policy Analytics

STIGing Made Easy – Microsoft Endpoint Manager

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. With my large customer base in the Microsoft Federal space and having to comply with internal security baselines ... continue reading
Video Tutorial: Endpoint Protection Part 3 – BitLocker Integration and Management

Video Tutorial: Endpoint Protection Part 3 – BitLocker Integration and Management

Hello everyone, here is part 3 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by Steve Rachui, a Microsoft principal premier field engineer. This session focuses on the BitLocker management capabilities integrated into ... continue reading
Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Hello everyone, here is part 2 of a series focusing on Endpoint Protection integrations with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This session focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 1 - Introduction

Video Tutorial: Endpoint Protection Part 1 – Introduction

Hello everyone, we are starting a new video tutorial series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. The first session is an introduction and previews what ... continue reading

How to secure your hybrid work world with a Zero Trust approach

We are operating in the most complex cybersecurity landscape we’ve ever seen. Sophisticated and determined attackers are the norm. And we all are preparing for the next great disruption—hybrid work. Security has never been more important, and as I shared ... continue reading
™

Surface expands its Secured-core portfolio with the new Surface Laptop 4 powered by AMD Ryzen™ Mobile Processors

As operating systems are becoming more secure and resistant to compromise, advanced vectors like firmware, kernel and hardware direct memory access (DMA) have emerged as new favored targets for threat actors. Recent trends indicate a substantial growth in the number ... continue reading
Picture1.png

Create Your Own Custom Endpoint Administration Console Using Microsoft Power Apps

I've heard a bit of interest expressed recently in the ability to create a customizable Endpoint Configuration Manager (SCCM/ConfigMgr) console that could either be pruned down or featured up in a way to customize it to fit the specific needs ... continue reading