Mitigate risks with application block in Microsoft Defender Vulnerability Management [Public Preview]
Remediating vulnerabilities in organizations takes time so it’s essential to have effective risk management strategies in place. We know that […]
Remediating vulnerabilities in organizations takes time so it’s essential to have effective risk management strategies in place. We know that […]
When this will happen: Beginning May 8, 2023 How this affects your organization: To prevent accidental approvals, admins can require
Authenticator number matching to be enabled for all users Lire l’article »
When this will happen: Rollout to Current Channel (preview) will begin in mid-March (previously early March) and is expected to
This article is a follow-up to a previous one discussing conflicting proxy configurations and how Microsoft Defender for Endpoint behaves
Overview Some attack scenarios may require you to isolate a device from the network. This action can help prevent the
Announcing device isolation support for Linux [Public Preview] Lire l’article »
Attack Simulation Training is an intelligent phish risk reduction tool that measures behavior change and automates deployment of an integrated security
Customize login pages in Attack Simulation Training Lire l’article »
Intune can integrate data from Mobile Threat Defense (MTD) solutions such as Microsoft Defender for Endpoint and other non-Microsoft MTD partners as an information source for
Intune – Migrating between Mobile Threat Defense solutions Lire l’article »
Intune is excited to announce new device control capabilities that allows greater flexibility for enhanced endpoint security. This feature allows
Intune – New device control capabilities to manage removable storage media access Lire l’article »
Historically, admins that needed to move mailboxes between Microsoft 365 tenants were required to export or offboard the mailbox to
Cross-tenant User Data Migration [General Availability] Lire l’article »