It was Q4 2020 when I was asked to design a new Modern Workspace concept. The customer had no on-premises hardware/resources and wanted us to
Category: Security

If you reached this blog i assume you already know what Conditional Access is and where it’s used for. Therefor we can skip the smooth

Attack Surface Reduction rules have huge impact on endpoint security in a positive way. Last year I’ve implemented these rules in at least 10 environments

Passwords, the most common thing to authenticate with for years. Everyone knows about it and/or uses it. Since passwords are a weak security feature, and

In the past I was not really interested in Anti-Virus software. After having completed several Microsoft Defender for Endpoint implementations and migrations for desktops and