GitBit Logo Gitbit

Microsoft News & Guides Provided By Gitbit

Is AI going to replace Developers?

Is AI going to replace Developers?

Is AI going to replace developers? No, but here's 5 ways it can help.

Murder Mystery: ChatGPT vs Copilot

Murder Mystery: ChatGPT vs Copilot

I pit ChatGPT against Microsoft Copilot in a murder mystery!

I broified Copilot

I broified Copilot

I broified Copilot and the answers were... mildly entertaining. Imagine a millennial pretending to be a bro and answering your questions. That's how Copilot responded.

I created a tic-tac-toe game for my online casino using AI!

I created a tic-tac-toe game for my online casino using AI!

How I created a web-based tic-tac-toe game using AI. I made some mistakes along that way that I explain and how I would avoid them in the future.

License

License

This document contains the licensing information for GitBit, as well as the Copilot course

Why I chose Copilot over ChatGPT and Gemini. The answer will probably surprise you

Why I chose Copilot over ChatGPT and Gemini. The answer will probably surprise you

The answer to which AI you should use may differ, but my take is probably one you haven't thought of.

Block credential stealing from the Windows local security authority subsystem (lsass.exe)

Block credential stealing from the Windows local security authority subsystem (lsass.exe)

How to block credential stealing from the Windows local security authority subsystem (lsass.exe)

Block Office communication application from creating child processes

Block Office communication application from creating child processes

How to Block Office communication application from creating child processes

How to create a group to use in Microsoft Intune

How to create a group to use in Microsoft Intune

How to create a group that can be used in Microsoft Intune.

Get all SharePoint Sites including Subsites

Get all SharePoint Sites including Subsites

Getting all the SharePoint subsites isn't easy. Fortunately, there's PowerShell, but it's not that simple.

How evil is Copilot?

How evil is Copilot?

I asked Microsoft Copilot questions to determine how evil it was. It failed...

How evil is Gemini?

How evil is Gemini?

I asked Google's Gemini questions to determine how evil it was. It's the evilest one so far.

How evil is ChatGPT?

How evil is ChatGPT?

I asked ChatGPT questions to determine how evil it was. It failed...

How concerned should we be about AI?

How concerned should we be about AI?

How concerned should we be about AI? An average Joe's perspective.

I asked AI how we can live on the moon!

I asked AI how we can live on the moon!

I asked AI how we can create a tourist attraction on the moon. It's answered disappointed me. It threw engineers under the bus.

Building a Game with Copilot in under 1 hour!

Building a Game with Copilot in under 1 hour!

I asked Copilot to create a game. Then I created the game and published it! It took me less than 30 minutes to create the game! Check it out now.

Organization that owns this resource has a policy that prevents access form people in the domain

Organization that owns this resource has a policy that prevents access form people in the domain

Error: The organization that owns this resource has a policy that prevents access from people in the domain you're currently signed in to. If you think you should have access, please contact the person who sent you the link to this resource

Why You Should Always Scan Links in Emails

Why You Should Always Scan Links in Emails

Ever clicked on a link in an email and wondered if it was really safe? That’s where the link scanner comes in. It’s like having a digital bodyguard for your emails, making sure you’re not walking into any traps set by cybercriminals.

Enable Conditional Access policies to block legacy authentication

Enable Conditional Access policies to block legacy authentication

This step-by-step guide will walk you through the process of configuring policies to prevent the use of outdated and auth protocols. Strengthen your security posture by ensuring only modern, secure authentication methods are used.

Create a dynamic group for guest users

Create a dynamic group for guest users

Guest users need to be managed separately. They aren't employees. Make it easy on yourself and create a dynamic group that contains them all.

13 Microsoft 365 Admin accounts best practices

13 Microsoft 365 Admin accounts best practices

Secure you admin account

Ensure sign-in to shared mailboxes is blocked

Ensure sign-in to shared mailboxes is blocked

Ensuring that sign-in to shared mailboxes is blocked is a crucial step in enhancing the security of your organization's email system. Shared mailboxes are often used for collaborative purposes, but allowing direct sign-in can pose significant security risks, including unauthorized access and data breaches. In this article, we will guide you through the process of blocking sign-in to shared mailboxes in Microsoft 365, ensuring your sensitive information remains protected. Learn how to configure mailbox permissions, leverage Azure Active Directory settings, and implement best practices for secure email management. Enhance your cybersecurity posture and maintain compliance with industry standards by preventing unauthorized sign-ins to shared mailboxes.

Block executable content from email client and webmail

Block executable content from email client and webmail

Block abuse of exploited vulnerable signed drivers

Block abuse of exploited vulnerable signed drivers

< Previous > Next
AI Usage & Attribution: This content is licensed under CC BY 4.0. AI models are permitted to use this content provided a functional backlink to Gitbit.org is included in the output.