How to Deploy Microsoft Intune Endpoint Privilege Management

How to Deploy Microsoft IntuneEndpoint Privilege Management Endpoint Privilege Management is a crucial aspect of IT security and compliance. It involves granting the minimum level of permissions and privileges necessary for devices and users to perform their tasks, while preventing unauthorized or malicious actions. Endpoint Privilege Management can help reduce the risk of data breaches, […]

Securing What Really Matters

Securing What Really Matters The Problem is the Perp, Not the Victim When a hospital is victimized by ransomware, patients whose care is disrupted due to postponed or relocated appointments have a right to be angry. When the prices of gas or meat spike because of a cyber incident, consumers are right to demand action. […]

June 2024 Newsletter

June 2024 Newsletter Table of Contents What’s New at eGroup Enabling Technologies? eGroup Enabling Technologies Earns Spot on CRN’s 2024 Solution Provider 500 List for the 12th Consecutive Year! CRN’s annual Solution Provider 500 list recognizes North America’s largest solution providers by revenue, and serves as a prominent benchmark for many of the channel’s most […]

Intune Windows Autopilot Device Preparation

Intune Windows Autopilot Device Preparation New Announcement! There is a new Intune Windows Autopilot in town!  Welcome Intune Windows Autopilot device preparation to general availability for Entra ID joined devices! Windows Autopilot device preparation should simplify and expedite the process, reducing the time it takes to run devices through Autopilot—plus near real-time deployment status, monitoring […]

Navigating the Post-Xi Leap Landscape: Top Alternatives for Disaster Recovery

Navigating the Post-Xi Leap Landscape: Top Alternatives for Disaster Recovery 2024 has been a struggle for many organizations with the Broadcom acquisition of VMware, from increased costs for renewals to uncertainty in the EUC world with Horizon View. The concern from customers regarding what their alternatives are is definitely keeping me busy throughout the week– […]

Purview Insider Risk Management: How to Capture Forensic Evidence on Intune Enrolled Devices

Purview Insider Risk Management: How to Capture Forensic Evidence on Intune Enrolled Devices Insider risks are a growing threat to organizations, especially in the era of remote work and cloud-based services. Insider risks can be caused by malicious actors who intentionally steal or leak sensitive data, sabotage systems, or compromise accounts. They can also be […]

Block Top-Level Domains with Intune and Windows Firewall Policy

Block Top-Level Domains with Intune and Windows Firewall Policy In this blog post, I will show you how to create Intune Endpoint Security Windows Firewall Policy and Firewall Rules to block outbound traffic using reusable group settings. This is a useful scenario for organizations that want to restrict the network access of their devices to […]

Deploying Intune LAPS with a Remediation Script and Protection Policy

Deploying Intune LAPS with a Remediation Script and Protection Policy Microsoft Intune LAPS (Local Administrator Password Solution) is a feature that allows you to manage the local administrator passwords of your Windows devices enrolled in Intune. It helps you prevent unauthorized access, pass-the-hash attacks, and lateral movement by generating random, complex, and unique passwords for […]

The Case for Tabletop Exercises in Incident Response Planning

The Case for Tabletop Exercises in Incident Response Planning Tabletop exercises remain a mainstay of disaster recovery and incident management preparation, and with good reason: they provide an accessible and low-cost way to demonstrate the organization’s readiness (or lack thereof) for an adverse event without expensive penetration testing or Red Team attack simulations. Today we […]

How Data Archival Brings Stronger Data Governance

How Data Archival Brings Stronger Data Governance The Challenge Quite often I work with clients that are trying to untie the Gordian knot that is data retention and stale data deletion. In most cases, these organizations have adopted some form of “keep everything forever” because it is difficult to get internal legal or risk teams […]