Select Page
Video Tutorial: Endpoint Protection Part 8 - Windows Defender Application Control (WDAC) Policies

Video Tutorial: Endpoint Protection Part 8 – Windows Defender Application Control (WDAC) Policies

Hello everyone, here is part 8 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager integrates with Windows ... continue reading
Video Tutorial: Endpoint Protection Part 6 – Windows Defender Exploit Guard

Video Tutorial: Endpoint Protection Part 6 – Windows Defender Exploit Guard

Hello everyone, here is part 6 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This session focuses on how Configuration Manager integrates with Exploit ... continue reading
Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Hello everyone, here is part 5 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 4 – Firewall Policies

Video Tutorial: Endpoint Protection Part 4 – Firewall Policies

Hello everyone, here is part 4 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 3 – BitLocker Integration and Management

Video Tutorial: Endpoint Protection Part 3 – BitLocker Integration and Management

Hello everyone, here is part 3 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by Steve Rachui, a Microsoft principal premier field engineer. This session focuses on the BitLocker management capabilities integrated into ... continue reading
Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Hello everyone, here is part 2 of a series focusing on Endpoint Protection integrations with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This session focuses on how Configuration Manager can be used ... continue reading
Baseline-000-Import.png

How To Detect Changes In MECM Environments

Hi, Jonas here! Or as we say in the north of Germany: "Moin Moin!" I am a Senior Customer Engineer based in Germany and over the years I created several configuration items I use as part of a Microsoft Endpoint Configuration Manager (MECM / ConfigMgr) baseline to detect configuration changes in the environment. In this blog ... continue reading
Video Tutorial: Endpoint Protection Part 1 - Introduction

Video Tutorial: Endpoint Protection Part 1 – Introduction

Hello everyone, we are starting a new video tutorial series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. The first session is an introduction and previews what ... continue reading

How to secure your hybrid work world with a Zero Trust approach

We are operating in the most complex cybersecurity landscape we’ve ever seen. Sophisticated and determined attackers are the norm. And we all are preparing for the next great disruption—hybrid work. Security has never been more important, and as I shared ... continue reading
image001.jpg

Redirecting Known Folders to OneDrive for Business with MEMCM

Hello everyone, Chris Vetter Customer Engineer at Microsoft. I am writing to talk about creating OneDrive for Business profiles with Microsoft Endpoint Manager Configuration Manager (MEMCM). Let us start with the why. Since more businesses are allowing remote work these ... continue reading