Introduction In today’s digital landscape, where remote workers are the norm, ensuring the security of our computer systems is paramount. This blog post will explore the […]
Hello fellow geek! Today I’m going to cover a topic that isn’t well understood in the Azure community and can present significant risk to your Azure […]
Microsoft Entra ID (formerly Azure AD) is an enterprise access management and identity system for Microsoft cloud services. This enterprise identity system gives you access Continue […]
Applications come with a variety of installation types. One common type is the Win32 .exe format. The native .exe format is not an option when deploying […]
As you have seen in the news, Microsoft released a threat analysis on Storm-0558 activity on July 11, 2023. Additionally, Microsoft released additional defense-in-depth security Continue […]
Organizations are no longer bound to a well-defined perimeter network. Traditional tools used to deploy and manage applications do not work well for cloud-based remote users […]
As digitization continues to evolve in leaps and bounds, the need for effective, efficient, and secure management of identities and devices is ever more crucial. Continue […]
In this video, we review using Intune Configuration Profiles with Windows clients. We start by reviewing how they are different from Compliance Policies, then we look […]
Zero Trust is a security strategy used to design security principles for your organization. Zero Trust helps secure corporate resources by implementing the following security Continue […]
We can add devices with auto enrollment, or let our users enroll devices into Intune for mobile device management, but are they secure? In this video, […]
As the workforce becomes mobile, we can’t rely on users working exclusively from company-owned devices accessible on an internal network. Sometimes we must manage computers that […]