Select Page
USB2.jpg

MEM – All Things About USB Drive Management and Troubleshooting

Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading
Picture1.jpg

10 Reasons to Love Passwordless #5 – The ease of use and portability of security keys

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). In this post, Sue Bohn continues the series by sharing another benefit of passwordless. I love passwordless because of how much ... continue reading

Changing Drive Letters and Labels via PowerShell

Q: I want to change the drive letter and the drive label for a new USB drive. Is there a way with PowerShell? A: Of course. One way is to use WMI and the CIM cmdlets. PowerShell does not have ... continue reading

Ten Reasons to Love Passwordless #3: Why biometrics and passwordless are a dream combination

The Microsoft identity team recently launched a series explaining why they love passwordless authentication (and why you should too!).The series kicked off with posts on FIDO and NIST compliance. Alex Weinert continues the series with this post speaking to biometric ... continue reading
password.jpg

10 Reasons to love Passwordless #1: FIDO Rocks

Over the next few weeks, the Microsoft Identity team will share 10 reasons to love passwordless and why you should consider changing how you (and your users) login every day. Kicking off the series is Pamela Dingle. I love passwordless ... continue reading

New Surface PCs enable virtualization-based security (VBS) by default to empower customers to do more, securely

VBS and HVCI-enabled devices help protect from advanced attacks Escalation of privilege attacks are a malicious actor’s best friend, and they often target sensitive information stored in memory. These kinds of attacks can turn a minor user mode compromise into ... continue reading

Preparing to Manage Windows Virtual Desktops (WVD)

Introduction Technologies such as Intune and Endpoint Configuration Manager (used manage enterprise devices) are becoming more robust, and these tools can also now be used for virtual devices such as those used by Microsoft’s Windows Virtual Desktop service in Azure ... continue reading
Infograph describing the passwordless technology achievements in 2020

A breakthrough year for passwordless technology

As 2020 draws to a close, most of us are looking forward to putting this year in the rearview mirror. Since we depend even more on getting online for everything in our lives, we’re more than ready to be done ... continue reading
Animated GIF of two computer screens showing MIP and Purview

Manage, govern, and get more value out of your data with Azure Purview

Data is the currency of today’s economy. Data is being created faster than ever in more locations than organizations can track. In fact, IDC has predicted that global data will grow to more than 175 zettabytes by 2025. To put ... continue reading
image.png

Microsoft Endpoint DLP Lightning-Round

Season’s greetings, my fellow IT Pros of the world! As you know, M365 is a set of services for business productivity, security and compliance. Across those services, Microsoft has interwoven an information protection ‘platform,’ which is referred to as Microsoft ... continue reading