Part 2 – Improve endpoint user experience with Microsoft Endpoint Analytics: Startup Performance
My previous blog post was a brief introduction to Microsoft Endpoint Analytics, what it is and how it relates to Microsoft productivity score. In...
Improve your endpoint user experience with ‘Insight driven IT’ Endpoint Analytics: A first impression!
Microsoft Endpoint Analytics overview page.
With Endpoint Analytics organizations are able to improve user productivity and reducing IT costs by giving you insights about device...
Remote anything: Publish complex ‘full-path’ web applications with Azure AD Application Proxy
These days where households are rapidly turning into remote offices the need to make business applications available as if they were available from the...
Microsoft Defender Antivirus: Catch(up) me if you can!
If you are using Microsoft Defender Antivirus and managing your Windows 10 clients via co-management (Microsoft Endpoint Configuration Manager (MECM) or Microsoft Endpoint Manager...
Troubleshooting: Endpoint Configuration Manager Device Collection Membership Synchronization
Device collection membership Synchronization to Azure AD security groups (aka Azure AD Group sync) is introduced since 1906 and offers a multitude of new...
Defender ATP & Linux: trusting Microsoft to protect your open-source workloads
Microsoft’s Defender ATP has been a big success. The EDR-based solution for endpoints is taking the market by storm and organizations are often using...
Microsoft Threat Protection: going down the rabbit hole
Recently, Microsoft announced the general availability of Microsoft Threat Protection (MTP). The new over-arching solution combines signals from Microsoft Defender ATP (endpoints), Office 365...
Honeypot for CVE-2020–0618 aka SQL Reporting Services vulnerability
Organizations can use so called Threat Intelligence feeds to purchase lists of IP addresses of potential malicious actors. Commercial parties like FireEye offer them...
As a good host benefits: Azure AD welcomes your guests (accounts) using Security Keys
Imagine yourself, use security keys to provide guest accounts access to resources in environments where use of smartphones is prohibited. This use case recently...
Detecting CVE-2020–0601 and other attempts to exploit known vulnerabilities using Azure Sentinel
Yesterday, Microsoft has released a security update for Windows which includes a fix to a dangerous bug that would allow an attacker to spoof...