MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
Overview and Operational Reports | Microsoft Intune Reporting Series, Part One

Overview and Operational Reports | Microsoft Intune Reporting Series, Part One

by Steve Bowman | Jan 31, 2022 | Endpoint Management, Microsoft Intune, Patch Management, Unified Endpoint Management

Estimated Reading Time: 11 minutesIntroduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices. What’s next? How do you validate your endpoints’ management states, and how do you track...
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

by Steve Bowman | Jan 4, 2022 | Case Studies, Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management

Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
Investigating Entity Profiles With Microsoft Defender for Identity

Investigating Entity Profiles With Microsoft Defender for Identity

by Steve Bowman | Dec 9, 2021 | Cyber Security, Endpoint Management

Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...
In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

by Jason Rutherford | Nov 12, 2021 | Cyber Security, Unified Endpoint Management

Estimated Reading Time: 7 minutesHello, and welcome to Model Technology Solutions’ approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our maturity model. If you’ve missed the introductory video or any other video in...
Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

by Steve Bowman | Nov 4, 2021 | Cyber Security, Office 365

Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow