Friday, October 22, 2021

Endpoint & Security, The Curse of the Were-Applocker

0
This blog will be all about the Endpoint Security series blogs I have written until now and why. If you haven’t read my blogs...

The Death of Compliance

0
This blog will show you how Device Based Conditional Access works and how it determines if your device is compliant or not!. I have...

Multimedia redirection for Azure Virtual Desktop preview

0
Last week the public preview of Multimedia redirection (MMR) for Azure Virtual Desktop was announced! MMR provides the user with a very smooth video...

Remote App: The Last Whish

0
In one of my older blogs, I was talking a lot about how and why you don’t always need to go hybrid (HAADJ). I...

This might be the FIDO2 key for you! Authentrend ATKey.Pro

0
In the past few years, I tried different types of FIDO2 keys, from different vendors. And picking your FIDO2 key might seem simple, but...

Sandbox: Multiverse of Madness

0
After seeing Damien van Robaeys doing some awesome stuff with Windows Sandbox, I noticed I didn’t write anything about Windows Sandbox…. Even while I...

​​​​​​​“Have the courage to follow your heart and intuition”

0
Some choices are difficult, but they are part of a man’s growth. I started more than 10 years ago at InSpark. At the time I...

Last PID.txt Standing

0
This time a small blog, this blog will show you when reinstalling an existing device and enrolling it into autopilot white-glove could get you...

How to implement a simple automation solution.

0
Nowadays automation is one of the most wanted adoptions in the Market.How comfortable is to create a whole new environment with only one click? Automation...

The Battle Between AADJ and AADR

0
After answering (yet again) a question on the Technet forum. I noticed I did not have a blog about the information he needed! So...

Join the club!