In celebration of the half way point in our webinar series I’m letting you choose the next topic. I took suggestions during the June webinar and those are what you see here. Let me know which topic to present in July
You may also like
Where should you configure ASR rules? I had this question, so I asked a contact in Endpoint Management at Microsoft.
Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
All of your clients that receive files from thier customers are probably doing it wrong. They already own a better solution
The Chrome version of Edge has a full set of Group Policy and Intune configuration options that can enhance security.