Lukas Beran
@lukasberan.com
Senior Security Researcher (DART) at Microsoft. Opinions are my own. #MSIncidentResponse #DART #Microsoft365 #EntraID #DefenderXDR #Sentinel
Seriously, Apple?
That plastic-like white back on your silver flagship iPhone looks awful. This might be the ugliest iPhone ever, and I’m seriously thinking about returning it purely because of the design.
That plastic-like white back on your silver flagship iPhone looks awful. This might be the ugliest iPhone ever, and I’m seriously thinking about returning it purely because of the design.
September 20, 2025 at 4:43 PM
Seriously, Apple?
That plastic-like white back on your silver flagship iPhone looks awful. This might be the ugliest iPhone ever, and I’m seriously thinking about returning it purely because of the design.
That plastic-like white back on your silver flagship iPhone looks awful. This might be the ugliest iPhone ever, and I’m seriously thinking about returning it purely because of the design.
𝗛𝗼𝘄 𝘁𝗼 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗰𝗮𝗹𝗹𝘆 𝘂𝗽𝗱𝗮𝘁𝗲 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗼𝗻 𝗰𝗼𝗺𝗽𝘂𝘁𝗲𝗿𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗜𝗻𝘁𝘂𝗻𝗲
Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.
Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.
August 29, 2025 at 11:55 AM
𝗛𝗼𝘄 𝘁𝗼 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗰𝗮𝗹𝗹𝘆 𝘂𝗽𝗱𝗮𝘁𝗲 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗼𝗻 𝗰𝗼𝗺𝗽𝘂𝘁𝗲𝗿𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗜𝗻𝘁𝘂𝗻𝗲
Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.
Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.
🚨 Security Alert: Synology Active Backup for Microsoft 365 Vulnerability 🚨
Modzero discovered a critical vulnerability in Synology’s "Active Backup for Microsoft 365" (ABM) that exposed sensitive cloud data.
Modzero discovered a critical vulnerability in Synology’s "Active Backup for Microsoft 365" (ABM) that exposed sensitive cloud data.
July 6, 2025 at 11:01 AM
🚨 Security Alert: Synology Active Backup for Microsoft 365 Vulnerability 🚨
Modzero discovered a critical vulnerability in Synology’s "Active Backup for Microsoft 365" (ABM) that exposed sensitive cloud data.
Modzero discovered a critical vulnerability in Synology’s "Active Backup for Microsoft 365" (ABM) that exposed sensitive cloud data.
𝗛𝗼𝘄 𝘁𝗼 𝗰𝗼𝗹𝗹𝗲𝗰𝘁 𝗰𝘂𝘀𝘁𝗼𝗺 𝗲𝘃𝗲𝗻𝘁 𝗜𝗗𝘀 𝘁𝗼 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗦𝗲𝗻𝘁𝗶𝗻𝗲𝗹
Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.
Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.
June 30, 2025 at 3:05 PM
𝗛𝗼𝘄 𝘁𝗼 𝗰𝗼𝗹𝗹𝗲𝗰𝘁 𝗰𝘂𝘀𝘁𝗼𝗺 𝗲𝘃𝗲𝗻𝘁 𝗜𝗗𝘀 𝘁𝗼 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗦𝗲𝗻𝘁𝗶𝗻𝗲𝗹
Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.
Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.
𝗛𝗼𝘄 𝘁𝗼 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗦𝗲𝗹𝗳-𝗦𝗲𝗿𝘃𝗶𝗰𝗲 𝗣𝗮𝘀𝘀𝘄𝗼𝗿𝗱 𝗥𝗲𝘀𝗲𝘁 𝗳𝗼𝗿 𝗮𝗱𝗺𝗶𝗻𝗶𝘀𝘁𝗿𝗮𝘁𝗼𝗿𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
June 25, 2025 at 1:02 PM
𝗛𝗼𝘄 𝘁𝗼 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗦𝗲𝗹𝗳-𝗦𝗲𝗿𝘃𝗶𝗰𝗲 𝗣𝗮𝘀𝘀𝘄𝗼𝗿𝗱 𝗥𝗲𝘀𝗲𝘁 𝗳𝗼𝗿 𝗮𝗱𝗺𝗶𝗻𝗶𝘀𝘁𝗿𝗮𝘁𝗼𝗿𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗰 𝗲𝗺𝗮𝗶𝗹 𝗳𝗼𝗿𝘄𝗮𝗿𝗱𝗶𝗻𝗴 𝗶𝗻 𝗢𝗳𝗳𝗶𝗰𝗲 𝟯𝟲𝟱
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment.
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment.
June 19, 2025 at 8:37 AM
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗰 𝗲𝗺𝗮𝗶𝗹 𝗳𝗼𝗿𝘄𝗮𝗿𝗱𝗶𝗻𝗴 𝗶𝗻 𝗢𝗳𝗳𝗶𝗰𝗲 𝟯𝟲𝟱
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment.
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment.
𝗨𝗻𝗱𝗲𝗿𝘀𝘁𝗮𝗻𝗱𝗶𝗻𝗴 𝘁𝗵𝗲 𝗔𝗰𝘁𝗶𝘃𝗲 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆 𝗧𝗶𝗲𝗿 𝗠𝗼𝗱𝗲𝗹
In this video, I walk through the fundamentals of the Active Directory Tier Model — what it is, why it matters, and how it helps protect privileged accounts and critical assets in your Windows environment.
In this video, I walk through the fundamentals of the Active Directory Tier Model — what it is, why it matters, and how it helps protect privileged accounts and critical assets in your Windows environment.
June 16, 2025 at 10:00 AM
𝗨𝗻𝗱𝗲𝗿𝘀𝘁𝗮𝗻𝗱𝗶𝗻𝗴 𝘁𝗵𝗲 𝗔𝗰𝘁𝗶𝘃𝗲 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆 𝗧𝗶𝗲𝗿 𝗠𝗼𝗱𝗲𝗹
In this video, I walk through the fundamentals of the Active Directory Tier Model — what it is, why it matters, and how it helps protect privileged accounts and critical assets in your Windows environment.
In this video, I walk through the fundamentals of the Active Directory Tier Model — what it is, why it matters, and how it helps protect privileged accounts and critical assets in your Windows environment.
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗮𝗰𝗸𝘂𝗽 𝗢𝗳𝗳𝗶𝗰𝗲 𝟯𝟲𝟱 𝗱𝗮𝘁𝗮
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
June 12, 2025 at 6:43 AM
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗮𝗰𝗸𝘂𝗽 𝗢𝗳𝗳𝗶𝗰𝗲 𝟯𝟲𝟱 𝗱𝗮𝘁𝗮
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝘀𝗽𝗲𝗰𝗶𝗳𝗶𝗰 𝗳𝗶𝗹𝗲 𝘁𝘆𝗽𝗲𝘀 𝗶𝗻 𝗲𝗺𝗮𝗶𝗹 𝗮𝘁𝘁𝗮𝗰𝗵𝗺𝗲𝗻𝘁𝘀
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
June 9, 2025 at 6:36 AM
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝘀𝗽𝗲𝗰𝗶𝗳𝗶𝗰 𝗳𝗶𝗹𝗲 𝘁𝘆𝗽𝗲𝘀 𝗶𝗻 𝗲𝗺𝗮𝗶𝗹 𝗮𝘁𝘁𝗮𝗰𝗵𝗺𝗲𝗻𝘁𝘀
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝘂𝗻𝗸𝗻𝗼𝘄𝗻 𝗽𝗹𝗮𝘁𝗳𝗼𝗿𝗺𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗
In conditional access policies, it is possible to block device platforms. It is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
In conditional access policies, it is possible to block device platforms. It is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
May 29, 2025 at 3:14 PM
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝘂𝗻𝗸𝗻𝗼𝘄𝗻 𝗽𝗹𝗮𝘁𝗳𝗼𝗿𝗺𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗
In conditional access policies, it is possible to block device platforms. It is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
In conditional access policies, it is possible to block device platforms. It is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝗻𝗲𝘄𝗹𝘆 𝗿𝗲𝗴𝗶𝘀𝘁𝗲𝗿𝗲𝗱 𝗱𝗼𝗺𝗮𝗶𝗻𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁
Newly registered domains can be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is usually being developed for some time.
Newly registered domains can be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is usually being developed for some time.
May 22, 2025 at 10:50 AM
𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝗻𝗲𝘄𝗹𝘆 𝗿𝗲𝗴𝗶𝘀𝘁𝗲𝗿𝗲𝗱 𝗱𝗼𝗺𝗮𝗶𝗻𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁
Newly registered domains can be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is usually being developed for some time.
Newly registered domains can be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is usually being developed for some time.
𝗛𝗼𝘄 𝘁𝗼 𝗿𝗲𝗾𝘂𝗶𝗿𝗲 𝗰𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝘁 𝗱𝗲𝘃𝗶𝗰𝗲 𝗳𝗼𝗿 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗮𝗰𝗰𝗲𝘀𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
May 19, 2025 at 7:08 AM
𝗛𝗼𝘄 𝘁𝗼 𝗿𝗲𝗾𝘂𝗶𝗿𝗲 𝗰𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝘁 𝗱𝗲𝘃𝗶𝗰𝗲 𝗳𝗼𝗿 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗮𝗰𝗰𝗲𝘀𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
𝐒𝐡𝐨𝐮𝐥𝐝 𝐈 𝐭𝐫𝐮𝐬𝐭 𝐞𝐱𝐭𝐞𝐫𝐧𝐚𝐥 𝐌𝐅𝐀 𝐨𝐫 𝐧𝐨𝐭 𝐈𝐧 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐄𝐧𝐭𝐫𝐚 𝐈𝐃?
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
May 12, 2025 at 8:09 AM
𝐒𝐡𝐨𝐮𝐥𝐝 𝐈 𝐭𝐫𝐮𝐬𝐭 𝐞𝐱𝐭𝐞𝐫𝐧𝐚𝐥 𝐌𝐅𝐀 𝐨𝐫 𝐧𝐨𝐭 𝐈𝐧 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐄𝐧𝐭𝐫𝐚 𝐈𝐃?
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
𝐇𝐨𝐰 𝐭𝐨 𝐭𝐮𝐫𝐧 𝐨𝐧 𝐢𝐧𝐛𝐨𝐮𝐧𝐝 𝐒𝐌𝐓𝐏 𝐃𝐀𝐍𝐄 𝐢𝐧 𝐎𝐟𝐟𝐢𝐜𝐞 365
Inbound SMTP DANE is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
Inbound SMTP DANE is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
May 7, 2025 at 3:09 PM
𝐇𝐨𝐰 𝐭𝐨 𝐭𝐮𝐫𝐧 𝐨𝐧 𝐢𝐧𝐛𝐨𝐮𝐧𝐝 𝐒𝐌𝐓𝐏 𝐃𝐀𝐍𝐄 𝐢𝐧 𝐎𝐟𝐟𝐢𝐜𝐞 365
Inbound SMTP DANE is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
Inbound SMTP DANE is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
𝐇𝐨𝐰 𝐭𝐨 𝐦𝐚𝐩 𝐒𝐡𝐚𝐫𝐞𝐏𝐨𝐢𝐧𝐭 𝐬𝐢𝐭𝐞𝐬 𝐯𝐢𝐚 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐈𝐧𝐭𝐮𝐧𝐞
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
May 5, 2025 at 8:16 AM
𝐇𝐨𝐰 𝐭𝐨 𝐦𝐚𝐩 𝐒𝐡𝐚𝐫𝐞𝐏𝐨𝐢𝐧𝐭 𝐬𝐢𝐭𝐞𝐬 𝐯𝐢𝐚 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐈𝐧𝐭𝐮𝐧𝐞
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭 𝐓𝐚𝐦𝐩𝐞𝐫 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝
Tamper Protection in MDE is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
Tamper Protection in MDE is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
May 1, 2025 at 1:28 PM
𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭 𝐓𝐚𝐦𝐩𝐞𝐫 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝
Tamper Protection in MDE is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
Tamper Protection in MDE is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
There’s been a lot of buzz on social media lately about an infographic shared by the Conti ransomware group, the gang behind the ransomware of the same name. What really caught people’s attention was that Microsoft Defender for Endpoint ended up in the “LOL” category as the weakest protection.
April 28, 2025 at 4:05 PM
There’s been a lot of buzz on social media lately about an infographic shared by the Conti ransomware group, the gang behind the ransomware of the same name. What really caught people’s attention was that Microsoft Defender for Endpoint ended up in the “LOL” category as the weakest protection.
𝐁𝐥𝐨𝐜𝐤𝐢𝐧𝐠 𝐮𝐬𝐞𝐫 𝐜𝐨𝐧𝐬𝐞𝐧𝐭 𝐭𝐨 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐄𝐧𝐭𝐫𝐚 𝐈𝐃 𝐞𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐚𝐩𝐩𝐬
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID.
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID.
April 23, 2025 at 2:26 PM
𝐁𝐥𝐨𝐜𝐤𝐢𝐧𝐠 𝐮𝐬𝐞𝐫 𝐜𝐨𝐧𝐬𝐞𝐧𝐭 𝐭𝐨 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐄𝐧𝐭𝐫𝐚 𝐈𝐃 𝐞𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐚𝐩𝐩𝐬
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID.
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID.
𝐓𝐀𝐌𝐏𝐄𝐑 𝐏𝐑𝐎𝐓𝐄𝐂𝐓𝐈𝐎𝐍 𝐅𝐎𝐑 𝐄𝐗𝐂𝐋𝐔𝐒𝐈𝐎𝐍𝐒 𝐈𝐍 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐃𝐄𝐅𝐄𝐍𝐃𝐄𝐑 𝐅𝐎𝐑 𝐄𝐍𝐃𝐏𝐎𝐈𝐍𝐓
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
April 16, 2025 at 9:23 AM
𝐓𝐀𝐌𝐏𝐄𝐑 𝐏𝐑𝐎𝐓𝐄𝐂𝐓𝐈𝐎𝐍 𝐅𝐎𝐑 𝐄𝐗𝐂𝐋𝐔𝐒𝐈𝐎𝐍𝐒 𝐈𝐍 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐃𝐄𝐅𝐄𝐍𝐃𝐄𝐑 𝐅𝐎𝐑 𝐄𝐍𝐃𝐏𝐎𝐈𝐍𝐓
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
𝐇𝐎𝐖 𝐓𝐎 𝐓𝐔𝐑𝐍 𝐎𝐍 𝐑𝐄𝐏𝐎𝐑𝐓 𝐌𝐎𝐃𝐄 𝐈𝐍 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐃𝐄𝐅𝐄𝐍𝐃𝐄𝐑 𝐅𝐎𝐑 𝐄𝐍𝐃𝐏𝐎𝐈𝐍𝐓 𝐖𝐄𝐁 𝐂𝐎𝐍𝐓𝐄𝐍𝐓 𝐅𝐈𝐋𝐓𝐄𝐑𝐈𝐍𝐆
Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are several predefined categories to choose from. But first, you need to turn on report mode.
Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are several predefined categories to choose from. But first, you need to turn on report mode.
April 14, 2025 at 12:35 PM
𝐇𝐎𝐖 𝐓𝐎 𝐓𝐔𝐑𝐍 𝐎𝐍 𝐑𝐄𝐏𝐎𝐑𝐓 𝐌𝐎𝐃𝐄 𝐈𝐍 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐃𝐄𝐅𝐄𝐍𝐃𝐄𝐑 𝐅𝐎𝐑 𝐄𝐍𝐃𝐏𝐎𝐈𝐍𝐓 𝐖𝐄𝐁 𝐂𝐎𝐍𝐓𝐄𝐍𝐓 𝐅𝐈𝐋𝐓𝐄𝐑𝐈𝐍𝐆
Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are several predefined categories to choose from. But first, you need to turn on report mode.
Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are several predefined categories to choose from. But first, you need to turn on report mode.
April 5, 2025 at 6:44 AM
𝐇𝐎𝐖 𝐓𝐎 𝐀𝐋𝐋𝐎𝐖 𝐏𝐈𝐍 𝐑𝐄𝐒𝐄𝐓 𝐅𝐎𝐑 𝐖𝐈𝐍𝐃𝐎𝐖𝐒 𝐇𝐄𝐋𝐋𝐎 𝐅𝐎𝐑 𝐁𝐔𝐒𝐈𝐍𝐄𝐒𝐒
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
March 27, 2025 at 4:46 PM
𝐇𝐎𝐖 𝐓𝐎 𝐀𝐋𝐋𝐎𝐖 𝐏𝐈𝐍 𝐑𝐄𝐒𝐄𝐓 𝐅𝐎𝐑 𝐖𝐈𝐍𝐃𝐎𝐖𝐒 𝐇𝐄𝐋𝐋𝐎 𝐅𝐎𝐑 𝐁𝐔𝐒𝐈𝐍𝐄𝐒𝐒
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
𝐇𝐎𝐖 𝐂𝐎𝐍𝐅𝐈𝐆𝐔𝐑𝐄 𝐆𝐑𝐀𝐃𝐔𝐀𝐋 𝐑𝐎𝐋𝐋𝐎𝐔𝐓 𝐏𝐑𝐎𝐂𝐄𝐒𝐒 𝐅𝐎𝐑 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐃𝐄𝐅𝐄𝐍𝐃𝐄𝐑 𝐅𝐎𝐑 𝐄𝐍𝐃𝐏𝐎𝐈𝐍𝐓
Microsoft Defender for Endpoint supports gradual rollout of all update types – Security Intelligence Updates, Engine Updates, and also Platform Updates.
Microsoft Defender for Endpoint supports gradual rollout of all update types – Security Intelligence Updates, Engine Updates, and also Platform Updates.
March 20, 2025 at 12:03 PM
𝐇𝐎𝐖 𝐂𝐎𝐍𝐅𝐈𝐆𝐔𝐑𝐄 𝐆𝐑𝐀𝐃𝐔𝐀𝐋 𝐑𝐎𝐋𝐋𝐎𝐔𝐓 𝐏𝐑𝐎𝐂𝐄𝐒𝐒 𝐅𝐎𝐑 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐃𝐄𝐅𝐄𝐍𝐃𝐄𝐑 𝐅𝐎𝐑 𝐄𝐍𝐃𝐏𝐎𝐈𝐍𝐓
Microsoft Defender for Endpoint supports gradual rollout of all update types – Security Intelligence Updates, Engine Updates, and also Platform Updates.
Microsoft Defender for Endpoint supports gradual rollout of all update types – Security Intelligence Updates, Engine Updates, and also Platform Updates.
𝐀𝐂𝐂𝐎𝐔𝐍𝐓 𝐃𝐑𝐈𝐕𝐄𝐍 𝐔𝐒𝐄𝐑 𝐄𝐍𝐑𝐎𝐋𝐋𝐌𝐄𝐍𝐓 𝐅𝐎𝐑 𝐈𝐎𝐒/𝐈𝐏𝐀𝐃𝐎𝐒
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.
March 19, 2025 at 3:41 PM
𝐀𝐂𝐂𝐎𝐔𝐍𝐓 𝐃𝐑𝐈𝐕𝐄𝐍 𝐔𝐒𝐄𝐑 𝐄𝐍𝐑𝐎𝐋𝐋𝐌𝐄𝐍𝐓 𝐅𝐎𝐑 𝐈𝐎𝐒/𝐈𝐏𝐀𝐃𝐎𝐒
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.
𝐒𝐌𝐀𝐑𝐓 𝐋𝐎𝐂𝐊𝐎𝐔𝐓𝐒 𝐈𝐍 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐄𝐍𝐓𝐑𝐀 𝐈𝐃
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.
March 17, 2025 at 9:31 AM
𝐒𝐌𝐀𝐑𝐓 𝐋𝐎𝐂𝐊𝐎𝐔𝐓𝐒 𝐈𝐍 𝐌𝐈𝐂𝐑𝐎𝐒𝐎𝐅𝐓 𝐄𝐍𝐓𝐑𝐀 𝐈𝐃
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.