Estimated Reading Time: 11 minutesIntroduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices. What’s next? How do you validate your endpoints’ management states, and how do you track...
Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
Estimated Reading Time: 4 minutesHey everyone, Jason Rutherford here with Model Technology Solutions. Today we’re going to talk about how to configure an external app proxy. Using application proxy from Azure enables you to expose an internal web application to...
Estimated Reading Time: 3 minutesHi everyone. Welcome. My name is Jason Rutherford and I’m the Managing Partner for Model Technology Solutions. Today I’m going to show you Microsoft’s cloud access security broker (CASB) implements Dynamic Access...