image

How to Deploy Attack Surface Reduction (ASR) Rules 

ASR rule to GUID matrix Rule Name Rule GUID Block abuse of exploited vulnerable signed drivers 56a863a9-875e-4185-98a7-b882c64b5ce5 Block Adobe Reader from creating child processes 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Block all Office applications from creating child processes d4f940ab-401b-4efc-aadc-ad5f3c50688a Block credential stealing from the Windows local security authority subsystem (lsass.exe) 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 Block executable content from email client and webmail be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 Read More

image

How to Manage Apps Requests for Microsoft Teams

The apps that are blocked in your organization may affect user productivity and collaboration. Users can’t use blocked apps but view such apps and their information in the Teams store, and request approval from admins. After you evaluate the request, you may choose to allow an app or dismiss the request. This functionality provides you Read More

image

How to Set up Azure AD SSO integration with DocuSign

In this tutorial, you’ll learn how to integrate DocuSign with Microsoft Azure Active Directory (Azure AD). When you integrate DocuSign with Azure AD, you can: Use Azure AD to control who has access to DocuSign. Enable automatic sign-in to DocuSign for your users through their Azure AD accounts. Manage your accounts in one central location: Read More

image

How to Deploy Microsoft Defender for Identity with Microsoft 365 Defender

The deployment of Microsoft Defender for Identity with Microsoft 365 Defender has two phases – preparation and deployment. This article will outline the steps in each phase, and also provide instructions for special scenarios. Start using Microsoft 365 Defender To begin the deployment of Defender for Identity, sign in to the Microsoft 365 Defender portal. From Read More

image

How to Get Azure AD Users with Registered Devices Using PowerShell

In this post, I am going to share Powershell script to find and list devices that are registered by Azure AD users. We can use the Get-AzureADUserRegisteredDevice cmdlet to get the registered devices. Before proceed run the below command to connect Azure AD Powershell module. 1 Connect-AzureAD List registered devices of all Azure AD users: To get Read More

image

How to Deploy Password Policies Using Intune Configuration Profiles | Device Restriction

By Anoop C Nair Let’s learn how to deploy password policies using Intune on Windows 10 devices. We use Intune device restriction profile to deploy password policies for Intune managed Windows 10 devices. Steps to Configure Device Restrictions Password Policies Login to EndPoint.Microsoft.com Navigate to Devices – Configuration Profiles – + Create Profile Select Platform as Windows 10 and Read More