Microsoft Defender for Endpoints Threat & Vulnerability Management

Microsoft Defender for Endpoints Threat & Vulnerability Management Microsoft Defender for Endpoints Threat and Vulnerability Management (TVM) is one of my favorite MDE modules. It has constantly updated knowledge bases that are connected to Microsoft to provide insights and recommendations on the latest threats available. TVM is essentially assessing your environment at real time to […]

Microsoft Defender for Endpoints Live Response

Microsoft Defender for Endpoints Live Response Microsoft Defender for Endpoints provides many tasks that you can perform on a machine to investigate and remediate risks. Of those tasks, Live Response can be one of the most powerful tools. Live Response is a MDE EDR capability that provides a security team immediate remote console access to a device. […]

Microsoft Defender for Endpoint Detection and Response Management

Microsoft Defender for Endpoint Detection and Response Management Microsoft Defender for Endpoints Endpoint Detection and Response (EDR) is the first module of the platform that you will get immediate benefits from. By merely onboarding your devices to MDE, you light up all the capabilities within EDR. EDR capabilities provide actionable intel on threats that are […]

Microsoft Defender for Endpoint Onboarding Requirements and Strategies

Microsoft Defender for Endpoint Onboarding Requirements and Strategies The first task for a full featured Microsoft Defender for Endpoints (MDE) deployment is onboarding. Onboarding also is the primary task to start using Endpoint Detection and Response (EDR) feature. However, before diving into onboarding your first endpoint, you should determine the appropriate deployment architecture based on […]

Microsoft Defender for Endpoint Service Adoption

Microsoft Defender for Endpoint Service Adoption Microsoft Defender for Endpoints (MDE) is an endpoint security platform feature designed to help customers prevent, detect, investigate, and respond to threats. Combined with Microsoft Defender on clients and a leader on Gartner Magic Quadrant, it provides a true enterprise grade solution to help proactively identify and stop threats […]

Azure Sentinel Hunting

Azure Sentinel Hunting Hunting Overview Azure Sentinel Hunting is based off queries. It allows for manual, proactive investigations into possible security threats based on the ingested data as well as retroactive pursuits of attacks and root cause analysis. Hunting consists of several capabilities: Queries: Microsoft provided several built-in queries and custom queries can also be […]

eGroup awarded as a leading Solutions Provider NATIONWIDE by CRN

2020 CRN SP 500 List- 8th consecutive year The eGroup team announced today that for the EIGHTH YEAR IN A ROW CRN®, a brand of The Channel Company, has named eGroup to its 2020 SOLUTIONS PROVIDER (SP) 500 list. Each year, CRN releases its list of top 500 solution providers, a ranking of the leading IT […]

Are you N-E-S-T-ing for a better work from home experience?

Through the challenges we’re facing during this new “work from home” era, we are now acknowledging the need to transition our mindset from this is a “temporary” model to one that thinks of this as “long-term temporary”. Instead of waking up, rolling through Starbucks, and heading into the office, we now may find ourselves waking […]

HGTC Graduates to Nutanix and Lenovo

HGTC Graduates to Nutanix and Lenovo Hyperconverged Solution Increases Application Performance, Simplifies Deployment and Management, and Cuts >$1M from the Upgrade Budget “To say that I was extremely happy with the infrastructure proposal brought to me by John Dove, our VP of Technology, would be an understatement. Being able to modernize all of our IT infrastructure, […]