Skip to content

Endpoint Security

CIS benchmarks, LAPS, Defender for Endpoint, BitLocker, Conditional Access

mid 8 min read

Security Copilot Agents in the Intune Admin Center: What IT Admins Actually Need to Know

Four AI agents are now embedded directly in the Intune admin center, covering vulnerability remediation, device offboarding, policy configuration, and change review. Here's how they work, what they require, and where they still fall short.

mid 9 min read

Replacing Your Corporate VPN with Microsoft Entra Private Access: A Practical Guide

A step-by-step guide to replacing traditional VPN infrastructure with Microsoft Entra Private Access and Global Secure Access. Covers Quick Access setup, Private Network Connector deployment, Conditional Access integration, and the real gotchas that MS Learn doesn't warn you about.

mid 10 min read

Security Copilot Agents in Microsoft Intune: A Practical Field Guide

Learn how the four Security Copilot agents in Microsoft Intune (Change Review, Device Offboarding, Policy Configuration, and Vulnerability Remediation) work in practice, what they need to run, and where they fall short.

senior 9 min read

Conditional Access 'All Resources' Enforcement Change (MC1223829): What Desktop Engineers Must Audit Before May 13, 2026

Microsoft is closing a long-standing Conditional Access loophole on May 13, 2026. Here's a practical audit workflow for desktop engineers to find affected policies, excluded apps, and custom clients before enforcement begins.

mid 9 min read

Endpoint Privilege Management in Intune: Setting Up Support-Approved Elevations

How to configure Endpoint Privilege Management's support-approved workflow in Intune so standard users can request elevation on demand without permanent admin rights.

mid 4 min read

Endpoint Privilege Manager Part 1: Introduction & Setup

Learn what Intune Endpoint Privilege Manager is and how to set it up in your environment.

mid 5 min read

Endpoint Privilege Manager Part 2: Creating Policies & Rules

Step-by-step guide to creating and configuring Endpoint Privilege Manager policies.

mid 5 min read

Endpoint Privilege Manager Part 3: Management & Troubleshooting

Monitor EPM activity, generate reports, and fix common issues.

mid 2 min read

BitLocker Recovery Keys: The Complete Guide

Managing BitLocker recovery keys in enterprise environments. Backup, recovery, and automation with Intune.

mid 1 min read

Certificate Management in Windows

Managing certificates in Windows. SSL, code signing, and enterprise PKI. PowerShell certificate operations.

senior 1 min read

CIS Benchmark Hardening for Windows

Apply CIS Microsoft Windows 10/11 Enterprise Benchmark. Secure your Windows devices with proven security settings.

mid 2 min read

Intune Compliance Policies Explained

Configure Intune device compliance policies. Set up conditions for access, conditional access, and device health.

junior 2 min read

Intune Device Restriction Profiles Explained

Complete guide to Intune device restriction profiles. Configure Windows security settings, firewall, and more.