Defender: Security Exposure Management

In an era where cyber threats are constantly evolving and attacks are becoming more sophisticated, organizations need a central tool to understand and address their security exposures. Defender Security Exposure Management is just that tool – a unified portal that provides a real-time view of risks and helps […]

Local macOS Compliance Checker

Why Compliance Matters for macOS Admins With macOS, Apple continues to enhance security and streamline device management. However, these changes introduce new challenges for IT teams, particularly in verifying security configurations and compliance policies. Many IT admins rely on Intune or other MDMs to enforce compliance policies, but […]

Install 3.part software on macOS

Introduction When managing macOS devices with Microsoft Intune, deploying and updating applications efficiently is a key challenge. Installomator simplifies this process by offering an automated way to install and update nearly 1000 macOS applications. In this post, I’ll introduce Installomator, show you how to deploy it via Intune, and demonstrate a simple […]

HardeningKitty: Audit Baseline with Intune

Introduction In this blog, I will explore how to leverage HardeningKitty in conjunction with Intune, enabling us to remotely audit our clients and ensure they meet our security baseline. By integrating HardeningKitty with Intune, we can automate the process of security auditing, streamline the management of audit reports, […]

Embrace the Future Endpoint – Part 3

Introduction In Parts 1 and 2 of this blog series, we embarked on a journey towards modern endpoint management, beginning with the recognition of the limitations of traditional tools like SCCM, followed by the transition to more flexible and dynamic solutions such as Microsoft Intune and Microsoft Defender […]

ASR Rules – anno 2023

Introduction In my client management journey, Attack Surface Reduction (ASR) rules have become pivotal. These rules, central to Microsoft Defender, are designed to minimize the ‘opportunities’ for attackers to exploit our systems. Microsoft Defender for Endpoint further leverages these rules, providing enhanced alerting, reporting, and threat context, simplifying […]

Setup virtual MacOS Sonoma to Intune

Introduction In this blog post, I will setting up the new MacOS Sonoma(Beta) as a virtual machine via Parallels and onboard it to Intune.Microsoft made it possible to onboard virtual MacOS to Intune. So we will go through how easy it is to enroll virtual MacOS Sonoma to […]

Embrace the Future Endpoint – Part 2

Introduction and recap In the first part of our series, we embarked on an exploration of the evolving landscape of endpoint management. We discussed the ‘Future Endpoint’, an emerging concept representing the wide array of devices and systems that businesses must now manage. We scrutinized traditional endpoint management […]