You might be surprised, I was, at which devices have …
I was setting up a kitchy OOF for the upcoming holiday season, when I noticed this menu item […]
Mastermind Groups for all sizes. Trusted business friends are invaluable. Solo, Small and Large firms groups available. These groups are not random conversation. They are structured.
Read more »At the end of this course, you will have developed your AI Consultancy plan and be ready to integrate it into your MSP offering. Check out the syllabus
Read more »Continuous learning in the form of a monthly newsletter and teaching webinar on new and changed features of Defender XDR and Intune for all learner types.
Read more »I was setting up a kitchy OOF for the upcoming holiday season, when I noticed this menu item […]
At the end of this course, you will have developed your AI Consultancy plan and be ready to integrate it into your MSP offering.
Experience continuous learning with our monthly newsletter and teaching webinar on Defender XDR + Intune. Enhance your knowledge and stay up-to-date!
Recently a new trend has emerged where criminals are attempting to hide their activity behind a barrage of spam email to the compromised mailbox or to any popular mailbox in the domain.
It’s been a long time since Third Tier did an in-person event. We did Brain Explosions years ago. […]
Attack Surface Reduction (ASR) rules have expanded to include a full range of zero-day protections. If you aren't using them today or haven't tried to use them recently, then it's time to look again. If you aren't locking down Windows natively then you're missing out on critical security features.
The real purpose of Troubleshooting Mode, then is for you to document changes that you need to make to the organizational policy for Defender for the affect machines.
Students in the Defender XDR course were advised not to alter threat actions in their anti-virus policy, leaving them as Not configured. This allows Defender to use its default behaviors, local device settings, signature-defined actions, and automatic remediation. Relying on Microsoft's security expertise ensures optimal threat management.
AI imaging tools like DALL-E, Midjourney, and Stable Diffusion often struggle with spelling correctly in generated images for several key reasons
Defender for Office has a new way of making it easy for you to deploy policies. Instead of […]
Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.