How to Manage Microsoft Defender on Windows Server via Intune
As companies adopt Microsoft Defender, there are certain questions coming from customers in terms of EPP management. These questions are mostly focusing on Microsoft Defender management in Windows Servers. I’d like to touch base on different management options for different ... continue reading

Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082
October 1, 2022 update – Added information about Exploit:Script/ExchgProxyRequest.A, Microsoft Defender AV’s robust detection for exploit behavior related to this threat. We also removed a section on MFA as a mitigation, which was included in a prior version of this ... continue reading
LEDBAT Background Data Transfer for Windows
LEDBAT is the background data transfer product built into the Windows networking stack and recommended by the Windows Data Transport team for moving bulk data without interfering with foreground traffic. LEDBAT has a couple of advantages that make it our ... continue reading
Getting started with Azure Bicep
As technology has evolved, so have the tools we can use to build (or rebuild!) standard, repeatable system configurations. I remember building my first Windows-based computer systems using an "answer file" to populate and bypass the "out of the box" ... continue reading
MBAM Server Migration To Microsoft Endpoint Manager
Dear IT Pros, Today we discuss about MBAM's Bitlocker data migration to MEM Microsoft provides a range of flexible BitLocker management alternatives to meet organization’s needs, as follows: Cloud-based BitLocker management using Microsoft Endpoint Manager. On-premises BitLocker management using System ... continue reading
System Center 2012 Configuration Manager is Approaching End of Support
Microsoft System Center 2012 Configuration Manager has a support and servicing lifecycle during which we provide new features, software updates, security fixes, etc. This lifecycle lasts for a minimum of 10 years from the date of the product’s initial release ... continue reading
Why is Update Installation Failing: Eliminating the Usual Suspects
Hi all – Jeremy here with an interesting case where Windows Server 2016 systems in one of my customer’s enterprise environments couldn’t complete installation of the Latest Cumulative Update (LCU). As a Premier Field Engineer, it’s my responsibility to troubleshoot/diagnose ... continue reading

Zero Trust Deployment Guide for devices
The modern enterprise has an incredible diversity of endpoints accessing their data. This creates a massive attack surface, and as a result, endpoints can easily become the weakest link in your Zero Trust security strategy. Whether a device is a ... continue reading
Three things to remember when migrating servers to Azure
Over the last few years, I have spoken to customers who are either looking to expand their datacenter into Azure or move their workloads into Azure instead of hosting them on prem. Often the workloads they are looking to host ... continue reading
Azure DSC for Zero Trust Windows 10 Devices Managed by Intune
Introduction Zero Trust is defined by Microsoft as model that “assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to ... continue reading