Fresh News

Latest Blog Articles

Using Intune Remediations to Address Massive CrowdStrike Outage

CrowdStrike faces a major outage due to a driver channel file causing widespread BSOD. Intune scripts detect and remove problematic files. Intune can also enable users to self-service BitLocker keys. Conditional Access can control key access and Audit Logs can monitor key usage. Compliance ensures key access from compliant devices only.

Read More »

Fixing Issues with Add-ins and Office Apps Security Baselines

This article explores the importance of Microsoft Word security policies and the issues that can arise with Office security baselines. It covers challenging settings such as add-in signing and trust bar notifications, and provides a solution using Microsoft Intune to address trusted publisher issues. Proper implementation of security baselines is emphasized to avoid potential problems.

Read More »

Windows 11 Best Practices Part Four: User Experience

This multi-part series on Windows 11 best practices has covered onboarding, security, and advanced security. Part 4 delves into user experiences, addressing Windows Hello for Business with Cloud Kerberos Trust, OneDrive best practices, Microsoft Edge configuration, user password solutions, 3rd party ADMX integrations with Intune, self-service password reset, and Office 365 cloud app policies. These components aim to enhance the end user’s experience.

Read More »

Windows 11 Best Practices Part Three: Security Advanced

The latest article delves into advanced security technologies for Windows 11, including Endpoint Privilege Management (EPM), Windows Defender Application Control (WDAC), Application Patch Management, and Device Control. EPM leverages Microsoft Intune and features automatic elevation and reporting capabilities. WDAC focuses on restricting app execution, requiring signed apps, and managing policies. Additionally, it provides a detailed outlook on managing WDAC policies and policy considerations, such as managing internal and 3rd party apps, enforcing code signing, and ensuring a scalable approach. The article also explores options for Windows Application Patch Management and Device Control in Microsoft Defender for Endpoint (MDE), emphasizing the importance of tailoring security capabilities to organizational needs to avoid creating an unmanageable security environment.

Read More »
Scroll to Top