Apr 19 · 4 min read · Endpoint encryption is not a complex technical problem. It is an execution problem. Most environments have BitLocker enabled on some machines, enforced inconsistently, with no centralized key escrow and no reliable reporting on what is actually encry...
Join discussionMar 7 · 6 min read · Designed a high-security exam environment serving 200+ students on 48 shared devices. This project leverages Microsoft Intune and Azure Storage to deliver strict device hardening, centralized data iso
Join discussion
Feb 2 · 6 min read · What is IT Inventory Management? IT inventory management is the continuous process of identifying, recording, and updating the status of all technology assets within an organization. It includes detailed records of hardware specifications, software v...
Join discussionFeb 1 · 4 min read · Alert Investigation Walkthrough (LetsDefend.io) Today, I’m going to walk through my investigation of the SOC202 – FakeGPT Malicious Chrome Extension alert from LetsDefend.io. This write-up documents my step-by-step thought process as a SOC analyst, a...
Join discussion
Dec 27, 2025 · 4 min read · On a recent customer call, a simple question turned into a much bigger design discussion: “We have devices that aren’t in Intune or any management tool yet, but we still want them onboarded to Microsoft Defender for Endpoint and protected by baselin...
Join discussion
Nov 25, 2025 · 2 min read · In today's hyper-connected enterprise environment, every endpoint —whether a laptop, server, mobile device, or virtual machine —is a potential breach point for cyber attackers. As per the emergence of hybrid work and the cloud, traditional antivirus ...
Join discussion