Microsoft News & Guides Provided By Gitbit
Is AI going to replace Developers?
Is AI going to replace developers? No, but here's 5 ways it can help.
Murder Mystery: ChatGPT vs Copilot
I pit ChatGPT against Microsoft Copilot in a murder mystery!
I broified Copilot
I broified Copilot and the answers were... mildly entertaining. Imagine a millennial pretending to be a bro and answering your questions. That's how Copilot responded.
I created a tic-tac-toe game for my online casino using AI!
How I created a web-based tic-tac-toe game using AI. I made some mistakes along that way that I explain and how I would avoid them in the future.
License
This document contains the licensing information for GitBit, as well as the Copilot course
Why I chose Copilot over ChatGPT and Gemini. The answer will probably surprise you
The answer to which AI you should use may differ, but my take is probably one you haven't thought of.
Block credential stealing from the Windows local security authority subsystem (lsass.exe)
How to block credential stealing from the Windows local security authority subsystem (lsass.exe)
Block Office communication application from creating child processes
How to Block Office communication application from creating child processes
How to create a group to use in Microsoft Intune
How to create a group that can be used in Microsoft Intune.
Get all SharePoint Sites including Subsites
Getting all the SharePoint subsites isn't easy. Fortunately, there's PowerShell, but it's not that simple.
How evil is Copilot?
I asked Microsoft Copilot questions to determine how evil it was. It failed...
How evil is Gemini?
I asked Google's Gemini questions to determine how evil it was. It's the evilest one so far.
How evil is ChatGPT?
I asked ChatGPT questions to determine how evil it was. It failed...
How concerned should we be about AI?
How concerned should we be about AI? An average Joe's perspective.
I asked AI how we can live on the moon!
I asked AI how we can create a tourist attraction on the moon. It's answered disappointed me. It threw engineers under the bus.
Building a Game with Copilot in under 1 hour!
I asked Copilot to create a game. Then I created the game and published it! It took me less than 30 minutes to create the game! Check it out now.
Organization that owns this resource has a policy that prevents access form people in the domain
Error: The organization that owns this resource has a policy that prevents access from people in the domain you're currently signed in to. If you think you should have access, please contact the person who sent you the link to this resource
Why You Should Always Scan Links in Emails
Ever clicked on a link in an email and wondered if it was really safe? That’s where the link scanner comes in. It’s like having a digital bodyguard for your emails, making sure you’re not walking into any traps set by cybercriminals.
Enable Conditional Access policies to block legacy authentication
This step-by-step guide will walk you through the process of configuring policies to prevent the use of outdated and auth protocols. Strengthen your security posture by ensuring only modern, secure authentication methods are used.
Create a dynamic group for guest users
Guest users need to be managed separately. They aren't employees. Make it easy on yourself and create a dynamic group that contains them all.
13 Microsoft 365 Admin accounts best practices
Secure you admin account
Ensure sign-in to shared mailboxes is blocked
Ensuring that sign-in to shared mailboxes is blocked is a crucial step in enhancing the security of your organization's email system. Shared mailboxes are often used for collaborative purposes, but allowing direct sign-in can pose significant security risks, including unauthorized access and data breaches. In this article, we will guide you through the process of blocking sign-in to shared mailboxes in Microsoft 365, ensuring your sensitive information remains protected. Learn how to configure mailbox permissions, leverage Azure Active Directory settings, and implement best practices for secure email management. Enhance your cybersecurity posture and maintain compliance with industry standards by preventing unauthorized sign-ins to shared mailboxes.
Block executable content from email client and webmail