Security: First impressions of the new Windows 11 22H2 security feature Enhanced Phishing Protection

This blog article covers the new Windows 11 22H2 security feature Enhanced Phishing Protection in Microsoft Defender SmartScreen and gives first impressions.

  1. What is Enhanced Phishing Protection?
  2. How does Enhanced Phishing Protection work?
  3. How do I activate and configure Enhanced Phishing Protection?
  4. What are the first impressions?
    1. Warn me about malicious apps and sites
    2. Warn me about password reuse
    3. Warn me about unsafe password storage
    4. Phishing alerts in the Defender for Endpoint (MDE) portal
  5. Sources and additional links
Continue reading

Security: How to achieve a Microsoft Secure Score for Devices above 95% in Microsoft Defender for Endpoint with Microsoft Intune

This blog article shows how to master the security recommendations of Microsoft Defender for Endpoint (MDE) with Microsoft Intune and achieve a device secure score above 95%.

  1. Security recommendations analysis and how to start
  2. Security recommendations covered by security baselines
  3. Security recommendations overview not covered by security baselines
Continue reading

Security: First impressions of the new Windows 11 22H2 security feature Smart App Control

This blog article covers the new Windows 11 22H2 security feature Smart App Control (SAC) and gives first impressions as well as recommendations.

  1. What is Smart App Control (SAC)?
  2. How does Smart App Control (SAC) work?
  3. How do I activate and configure Smart App Control (SAC)?
  4. What are the first impressions?
  5. My recommendations
  6. Summary
Continue reading

Security: How to use Security Baselines and which policies can cause impact for your environment

This blog article covers the implementation options of the different Microsoft Intune security baselines and gives an overview of policies that can impact your users.

  1. For what purpose are the security baselines?
  2. What security baselines are available?
  3. How should the security baselines be used? How do I start?
  4. Which policies should be considered and checked in particular, as they could affect the user experience in your company?
Continue reading