Tag - endpoint security

Unboxing Microsoft Defender for Business: Device-based Conditional Access

Unboxing Microsoft Defender for Business, Part 4: Integration with MEM and Conditional Access

Welcome back to this series! Microsoft Defender for Business (MDB) is a huge product with lots of ground to cover. So far we have discussed the Simplified configuration process, Threat & Vulnerability Management, and Attack Surface Reduction Rules. Since we began our series an exciting thing has happened: MDB has been...
Read more...
Unboxing Defender for Business, Part 2: Threat & Vulnerability Management

Unboxing Defender for Business, Part 2: Threat & Vulnerability Management

Last time we looked at how to get started with Microsoft Defender for Business and the so-called "Simplified configuration process," which helped us onboard our first Windows devices and apply basic policies to manage antivirus and firewall settings across the organization. In this blog post, we will ask the question:...
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.