It was my pleasure to introduce peer groups to Third Tier. In 2024, we're introducing focused learning groups for Defender, Intune, Public speaking and more
You used to need an IT admin to help you get setup to send email from an alias. Somewhere along the way, this changed and now you can just send from an alias.
Despite criminal masterminds and "security researchers" always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
It's one of the least known and used portal in the entire Microsoft 365 suite. Too bad, because it contains some configuration and automation gems. Let's see how we use it to automate Office updates.
Fortunately, Defender protects against this when configured correctly. In addition to the Defender for Endpoint sensor installation, Attack Surface Reduction rules and certain anti-virus configurations should also be deployed
let's say that you've come across a situation, and you want to remove a device from the network - remotely, while you investigate. Interestingly this device, need not be enrolled in Defender for Business. It can an unmanaged device to