Select Page
image.png

Microsoft Endpoint DLP Lightning-Round

Season’s greetings, my fellow IT Pros of the world! As you know, M365 is a set of services for business productivity, security and compliance. Across those services, Microsoft has interwoven an information protection ‘platform,’ which is referred to as Microsoft ... continue reading
image1.png

HOW TO: Create a Windows Server 2019 NAS / FileServer from the command line

My old Synology NAS for home use had started to show signs of wear and was in need of replacement. It had plenty of disk space and performed well enough - but the version I had lacked any real power ... continue reading
USB7.PNG

Manage USB Devices on Windows Hosts

  Raven is a Miniature Schnauzer that doesn’t like small critters in the yard unless they can fly. This gives Raven an insurmountable challenge, since my wife is such an avid gardener. We live on the side of a hill ... continue reading
Figure 1: Azure AD allows users to sign in once and access Office 365 and non-Microsoft apps.

Securing a remote workforce with Zero Trust

Microsoft customers around the globe have responded to COVID-19 by moving their office employees to remote work. With more people working from home, identity-driven security solutions are required to help safeguard company resources. Nathan Lasnoski, Chief Technology Officer at Concurrency, ... continue reading
In-place sharing with Azure Data Share.

Share big data at scale with Azure Data Share in-place sharing for Azure Data Explorer

This post was co-authored by Jie Feng Principal Program Manager, and Sumi Venkitaraman Senior Product Manager, Microsoft Azure. Microsoft Azure Data Share is an open, easy, and secure way to share data at scale by enabling organizations to share data ... continue reading
Diagram showing process tree

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

The application of deep learning and other machine learning methods to threat detection on endpoints, email and docs, apps, and identities drives a significant piece of the coordinated defense delivered by Microsoft Threat Protection. Within each domain as well as ... continue reading
Preventing data loss and mitigating risk in today’s remote work environment

Preventing data loss and mitigating risk in today’s remote work environment

The shift to remote work over the past few months has increased the need for organizations to re-evaluate their security and risk management practices. With employees accessing corporate data at times on home computers or sharing and collaborating in new ... continue reading
Microsoft Endpoint Manager: Create & Audit an ASR Policy

Microsoft Endpoint Manager: Create & Audit an ASR Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating an Attack Surface Reduction (ASR) rule ... continue reading
LijuV_1-1591192288321.png

Password-less FIDO2 Security Key Signin to Windows 10 HAADJ Devices

Fido2 for SSO was introduced first for cloud resources, then on-premises resources. For either, use Azure AD joined or Hybrid Azure AD joined Windows 10 devices.continue reading
image001.png

Updating Configuration Manager in Offline Mode with the Service Connection Tool

Hey everyone, Chris Vetter Premier Field Engineer at Microsoft here to go over updating Configuration Manager Current Branch in an Offline environment. I have installed the Baseline version 1902 of Configuration Manager Current Branch and I am going to walk ... continue reading