Defender for Endpoint – What is it? And how do I on-board Windows Devices?

Ransomware is one of, if not the most, dangerous threat to organizations, and smaller businesses sometimes lack the resources to implement a security solution. Cyber attack threat scenarios have become more complicated than ever. Organizations with limited resources attempt to keep up with the going-ons while ensuring they have a zero-trust security policy that adapts…

Read More

Block USB devices using a Device Configuration Profile with Microsoft Intune

Endpoint USB-block security settings are a critical measure in preventing attacks. Uncontrolled installation of USB devices creates entry points for malware and raises the risk of data theft. Administrators can use Microsoft Intune to prevent end users from installing USB peripherals on their computers. Intune has profiles for various types of devices. IOS/iPadOS, Android, Android…

Read More