Select Page
Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Hello everyone, here is part 5 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Hello everyone, here is part 2 of a series focusing on Endpoint Protection integrations with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This session focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 1 - Introduction

Video Tutorial: Endpoint Protection Part 1 – Introduction

Hello everyone, we are starting a new video tutorial series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. The first session is an introduction and previews what ... continue reading
MEM Home

Attack Surface Reduction Rules – Warn Mode with MEM/M365 Defender

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In a previous blog back in July, 2020, I walked through a demo of setting up an Attack ... continue reading
USB2.jpg

MEM – All Things About USB Drive Management and Troubleshooting

Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading
Microsoft Endpoint Manager: Create & Audit an ASR Policy

Microsoft Endpoint Manager: Create & Audit an ASR Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating an Attack Surface Reduction (ASR) rule ... continue reading
JB Hunt truck, linking to video

Turning to a new chapter of Windows Server innovation

Today, January 14, 2020, marks the end of support for Windows Server 2008 and Windows Server 2008 R2. Customers loved these releases, which introduced advancements such as the shift from 32-bit to 64-bit computing and server virtualization. While support for ... continue reading
A diagram showing the recommended migration paths for Windows Server Roles

Protect workloads still running on Windows Server 2008 and 2008 R2

Over the last couple of years, we havesharedwhy it is business critical to migrate and upgrade apps and services running on Windows Server 2008 and 2008 R2. As you are aware, on January 14th, 2020, support for Windows Server 2008 ... continue reading
Enhanced Audit Status Message Queries

Enhanced Audit Status Message Queries

First published on TECHNET on Mar 18, 2019Authored by Brandon McMillanHello everyone! My name is Brandon McMillan and I am a System Center Configuration Manager (ConfigMgr) PFE. I have found that Status Message Queries can be one of the more ... continue reading
Azure Policy Guest Configuration – Service

Azure Policy Guest Configuration – Service

This post builds upon the introduction published earlier to the PowerShell blog. In this post we are going to explore the Azure Policy Guest Configuration service. The full documentation for this service is available at the following short url. https://aka.ms/gcpol ... continue reading