Friday, May 14, 2021

Part 4 – Improve endpoint user experience with Microsoft Endpoint Analytics: Recommended Software

0
In this 4th blog in a series of posts about Endpoint Analytics we’ll continue with Recommended Software, which one of the four main pillars...

Microsoft Threat Protection ‘Jupyter notebook’ #AdvancedHunting sample

0
TL;DR — I’ve created a Microsoft Threat Protection advanced hunting Jupyter notebook and shared it on my GitHub repository: https://github.com/maartengoet/notebooks/blob/master/mtp_hunting.ipynbMicrosoft Threat ProtectionMicrosoft Threat Protection...

Part 2 – Improve endpoint user experience with Microsoft Endpoint Analytics: Startup Performance

0
My previous blog post was a brief introduction to Microsoft Endpoint Analytics, what it is and how it relates to Microsoft productivity score. In...

Improve your endpoint user experience with ‘Insight driven IT’ Endpoint Analytics: A first impression!

0
Microsoft Endpoint Analytics overview page. With Endpoint Analytics organizations are able to improve user productivity and reducing IT costs by giving you insights about device...

Remote anything: Publish complex ‘full-path’ web applications with Azure AD Application Proxy

0
These days where households are rapidly turning into remote offices the need to make business applications available as if they were available from the...

Microsoft Defender Antivirus: Catch(up) me if you can!

0
If you are using Microsoft Defender Antivirus and managing your Windows 10 clients via co-management (Microsoft Endpoint Configuration Manager (MECM) or Microsoft Endpoint Manager...

Troubleshooting: Endpoint Configuration Manager Device Collection Membership Synchronization

1
Device collection membership Synchronization to Azure AD security groups (aka Azure AD Group sync) is introduced since 1906 and offers a multitude of new...

Defender ATP & Linux: trusting Microsoft to protect your open-source workloads

0
Microsoft’s Defender ATP has been a big success. The EDR-based solution for endpoints is taking the market by storm and organizations are often using...

Microsoft Threat Protection: going down the rabbit hole

1
Recently, Microsoft announced the general availability of Microsoft Threat Protection (MTP). The new over-arching solution combines signals from Microsoft Defender ATP (endpoints), Office 365...

Honeypot for CVE-2020–0618 aka SQL Reporting Services vulnerability

0
Organizations can use so called Threat Intelligence feeds to purchase lists of IP addresses of potential malicious actors. Commercial parties like FireEye offer them...

Join the club!