Having installed the MBAM components in the first part of this series of posts it is now time to validate that the IIS components are in place and also to be aware of what each of them do. Part 1: Installation of MBAM...
Over the past number of months I have had several engagements as a consultant to implement Microsoft BitLocker Administration and Monitoring (MBAM). Many of you might pose the question of why? is MBAM not a legacy...
This is a post about enabling BitLocker on non-HSTI devices with Windows 10 version 1809 and standard user permissions. First of all a little background on HSTI. HSTI is a Hardware Security Testability...
In the on-premises world, many organizations use the RestrictedGroup Group Policy setting to place their own workstation admin groups on domain joined machines, and of course to remove other rogue local...
Friday arrived early this week in the ConfigMgr community, with the announcement that the much anticipated 1806 build had hit public availability on the fast ring. This is a feature packed release, Nickolaj has already...
Since the beginning of the year Microsoft has been making numerous changes to updates both before and after patch Tuesday. With all of the changes to patches its hard to know when those changes are made unless you are...
In part 1 of this series I covered the newest tool on the block, Azure AD Password Protection, a tool which allows you to have greater control over account password complexity and account lock outs. In part 2 we will...
In this series I am going to step through how to help secure your internal infrastructure through the use of modern tools both running both within Azure AD and on your internal AD infrastructure. These tools should be...
On January 3rd Microsoft released a bunch of security updates around a hardware vulnerability found in the Intel chipset. Within hours of the patch coming out news outlets and more had exploded with information about...
Locking Down The Workstation Security is on everyone’s mind these days, and well it should be as threats pose both a risk for downtime for your employees and lost revenue through business interruption or...