Have you ever encountered the situation where you need to offboard a device from Defender for Endpoint, but don’t have access to the device? I
Microsoft announced on 09-01-2024 that Dynamic device tagging rules is now generally available. While using dynamic rules, we can group (tag) devices based on certain
In the past it was possible to create non-expiring client secrets. When creating a client secret the drop down menu showed the option Never expires.
Today a slightly different blog. Normally I blog about implementing stuff in Microsoft 365/Azure AD/Security. This one, is about an issue I encountered last week
In this blog I’ll show you step by step how to onboard Windows Servers (Known in Microsoft Defender for Cloud) to Microsoft Defender for Endpoint.
There might be a scenario where you would like to block (or Allow) specific Cloud Applications/Web Applications. In this blog I pick OpenAI ChatGPT as
While using Conditional Acces, we can require specific requirements for users, devices, apps, countries (locations), device states, etc. This gives us the opportunity to allow
Intune has great features, why don’t we combine them!? In this post I’ll show you how you can require specific ASR (Attack Surface Reduction Rules)