Intune. Defender. Entra. 💻🛡️👤 Leveraging Microsoft Technology
Aiming to bridge the gap between Microsoft cloud solutions and real-world IT challenges by providing actionable content that helps sys and security admins protect their endpoints and identities with defender and level up their cloud infrastructure with Entra and Intune.
Top 10 Entra & Intune Security Tips
This year at Geekmania 2025, I had the pleasure of sharing the stage with Niklas Tinner for a deep-dive session...
IoC's in Defender for Endpoint
Introduction In Microsoft Defender for Endpoint, Indicators of Compromise (IoCs) give security teams a way to extend detection and response:...
🧯 How to Break Glass (fast)
In every well-designed identity and access management (IAM) strategy, there should be a plan for emergencies, especially for scenarios where...
Intune and Windows LAPS, the new guide
Introduction In today’s ever-evolving threat landscape, managing local administrator accounts securely across a distributed device fleet is more crucial...
"High Risk" User Classifications Caused by MACE - little recap
While I was still peacefully frolicking through the land of dreams, the real alert wave was just beginning. The first...
Windows 365 Business or Enterprise?
When it comes to provisioning Cloud PCs, Microsoft offers two distinct flavors of Windows 365: Business and Enterprise. They might...
Configuring Bitlocker with Intune
Introduction In today's digital landscape, securing sensitive data is more crucial than ever. BitLocker, Microsoft's built-in...
Microsoft Security & Tech Tips in your inbox
- Latest Updates on Intune, Defender, Entra ℹ️
- Insights delivered via email 📥
- Practical Tips for Microsoft security and endpoint management 📢
- Join the awesome Community 🚀