Author: Driek Desmet
-
Introducing Enhanced File Integrity Monitoring (FIM) in Microsoft Defender for Cloud
Enhance your security with Microsoft Defender for Cloud’s improved File Integrity Monitoring (FIM). This powerful tool detects unauthorized changes to critical files and system configurations in real-time, ensuring compliance with regulations like NIS2 and PCI-DSS. Learn how FIM integrates with Microsoft Defender for Endpoint, provides real-time alerts, and helps safeguard your critical assets with proactive…
-
NIST Password Guidelines 2024: A Game Changer for Cybersecurity
**Excerpt:** Stay ahead in cybersecurity by adopting NIST’s updated password guidelines for 2024. The new **SP 800-63-4** emphasizes stronger password management, eliminating outdated practices like forced 60-day resets. Learn why passphrases, phish-resistant authentication, and dynamic password changes are the future of digital security. Make sure your systems, including Active Directory, are aligned with these modern…
-
Unlocking DUDE: A Guide to Dynamic User and Device Enumeration
DUDE (Dynamic User and Device Enumeration) is a powerful tool for IT administrators to automate the process of retrieving and managing user and device data from Azure AD. Leveraging Microsoft Graph API and PowerShell, DUDE streamlines security monitoring, compliance reporting, and device management. This guide covers its architecture, setup, common use cases, and real-world applications…
-
Secure Your Intune Environment with Multi-Admin Approval: Everything You Need to Know
Multi-Admin Approval (MAA) is a security feature introduced in March 2023 in Microsoft Intune, enhancing security by requiring multiple admin approvals for high-risk actions. This powerful tool helps prevent unauthorised changes, reduces risks, and supports compliance. In this guide, we’ll explore how MAA works, its benefits, required licences, and provide a step-by-step tutorial on setting…
-
Entra ID Conditional Access Baseline
Every spring, as fresh interns arrive, they’re tasked with creating a Conditional Access baseline. While the concept may seem simple, these young minds continually surprise with innovative approaches to security, reminding us that building a robust foundation is an ever-evolving process.
-
Disable Firewall and Network Protection Notifications with Microsoft Intune
Tired of constant firewall and network protection notifications cluttering your Windows 10 workstations? Learn how to easily disable these notifications using Microsoft Intune without turning off the firewall itself. This guide walks you through creating a custom device configuration policy with Configuration Service Provider (CSP) settings, allowing you to silence notifications while keeping your devices…
-
How to Declutter Endpoints by Deleting Stale User Profiles Using Intune
Managing shared or newly built Windows devices can be challenging, especially when old user profiles accumulate and pose security risks. With Microsoft Intune, you can easily declutter your endpoints by automatically deleting stale profiles. This guide walks you through setting up a configuration profile to remove profiles that have been inactive for 60 days, ensuring…
-
Microsoft Announces Enhanced Data Protection in Copilot for Enterprises
Next month, Microsoft is rolling out significant updates to its free Copilot service for users with a Microsoft Entra account. These updates will introduce Enterprise Data Protection (EDP) at no additional cost, extending robust security, privacy, and compliance measures to Copilot’s prompts and responses. Additionally, users will benefit from a new, simplified, ad-free interface tailored…
-
Understanding the Differences Between Intune Update Rings and Windows Autopatch
Managing Windows updates can be challenging, but choosing the right tool is crucial. This post explores the differences between Intune Update Rings and Intune Windows Autopatch, two powerful Microsoft solutions that cater to different IT management needs. Discover which option offers the best balance of control and automation for your organisation.
-
Simplify Device Compliance with Config Refresh: Essential for Endpoint Management
Discover how Microsoft’s new Config Refresh feature simplifies device compliance for systems and cloud engineers. This powerful MDM tool ensures consistent and secure configurations across your organisation, automatically correcting any deviations to maintain alignment with corporate policies. Integrating seamlessly with Microsoft Intune, Config Refresh is essential for effective endpoint management and reducing IT workload