by Gabriel Taylor | Jan 31, 2022 | Endpoint Management, Microsoft Intune, Patch Management, Unified Endpoint Management
Estimated Reading Time: 11 minutesIntroduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices. What’s next? How do you validate your endpoints’ management states, and how do you track...
by William Bracken | Jan 4, 2022 | Case Studies, Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management
Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
by Jesse Walter | Dec 9, 2021 | Cyber Security, Endpoint Management
Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...
by Jason Rutherford | Nov 12, 2021 | Cyber Security, Unified Endpoint Management
Estimated Reading Time: 7 minutesHello, and welcome to Model Technology Solutions’ approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our maturity model. If you’ve missed the introductory video or any other video in...
by Jesse Walter | Nov 4, 2021 | Cyber Security, Office 365
Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...