GitBit Logo Gitbit

Microsoft News & Guides Provided By Gitbit

Block persistence through WMI event subscription

Block persistence through WMI event subscription

Block execution of potentially obfuscated scripts

Block execution of potentially obfuscated scripts

Block Adobe Reader from creating child processes

Block Adobe Reader from creating child processes

What are ASR rules?

What are ASR rules?

What are ASR rules? Most commonly asked questions answered. How do I enable ASR rules? Where can I find ASR rules? How do I test Microsoft ASR rules? How do you audit ASR? How do I troubleshoot ASR rules? How many ASR rules are there?

Block untrusted and unsigned processes that run from USB

Block untrusted and unsigned processes that run from USB

Block executable files from running unless they meet a prevalence, age, or trusted list criterion

Block executable files from running unless they meet a prevalence, age, or trusted list criterion

Block JavaScript or VBScript from launching downloaded executable content

Block JavaScript or VBScript from launching downloaded executable content

Block process creations originating from PSExec and WMI commands

Block process creations originating from PSExec and WMI commands

Why block process creations originating from PSExec and WMI commands? How to block process creations originating from PSExec and WMI commands.

Use advanced protection against ransomware

Use advanced protection against ransomware

Why and use advanced protection against ransomware. Why is it a best practice? How do I set it up with Intune?

Block Office applications from injecting code into other processes

Block Office applications from injecting code into other processes

Blocking Office applications from injecting code into other processes can help protect your computer from malicious code that could potentially compromise your system or steal your personal information.

Block all Office applications from creating child processes

Block all Office applications from creating child processes

Why and how to block all Office applications from creating child processes. Why is it a best practice? How do I set it up with Intune? How do I block all Office applications from creating child processes without Intune?

Block Office applications from creating executable content

Block Office applications from creating executable content

Allowing executable content to be created from the Office app can be risky because it can potentially allow malicious actors to execute code on your computer without your knowledge or consent. Malicious executable content can include viruses, malware, or other types of malicious software that can harm your computer or steal your personal information.

Block Win32 API calls from Office macros

Block Win32 API calls from Office macros

Blocking Win32 API calls from Office macros can be a security measure to prevent potential malicious activities. Why is it a best practice? How do I set it up with Intune?

A personal tutor for cybersecurity beginners and pros

A personal tutor for cybersecurity beginners and pros

Looking to transition into a career in cybersecurity or simply starting to explore this field? Look no further than ChatGPT - your tutor for a comprehensive understanding of cybersecurity! I'll demonstrate how ChatGPT can help you grasp cybersecurity concepts that will prepare you for a career as a Microsoft 365 security admin. Whether you're a complete beginner or have some experience in the field, this guide is designed to meet your needs and guide you toward a successful career in cybersecurity.

Zero Trust Explained

Zero Trust Explained

What is zero trust? Why does zero trust matter? Please explain zero trust.

How to send emails through Microsoft 365 from PowerShell

How to send emails through Microsoft 365 from PowerShell

With basic authentication going away it's time to move on from using credentials in PowerShell scripts. Fortunately, there's a new way to send emails from scripts. Using app registration!

26 cyber security careers with average pay and number of jobs available

26 cyber security careers with average pay and number of jobs available

26 cyber security careers with average pay and number of jobs available on Dice, and Career Builber

9 Conditional Access Policies You'll Kick Yourself for Not Setting Up

9 Conditional Access Policies You'll Kick Yourself for Not Setting Up

9 top recommended conditional access policies to secure your Microsoft 365 environment

0 to hero - the ultimate Microsoft Defender for Endpoint (MDE) guide

0 to hero - the ultimate Microsoft Defender for Endpoint (MDE) guide

How to manage defender for endpoint?

The Anatomy of Great Phishing Emails

The Anatomy of Great Phishing Emails

Everything you need to know about the anatomy of a great phishing email, with insights from a cybersecurity expert. We'll walk you through exactly what a hacker will do to track your users into giving up access to their accounts

14 steps to fix a hacked Microsoft 365 account

14 steps to fix a hacked Microsoft 365 account

14 steps to fix a compromised Microsoft 365 account. How to lock out the intruder and harden the account so it doesn't happen again.

Error connecting Windows 10 computer to Microsoft 365. Error code: 80180014

Error connecting Windows 10 computer to Microsoft 365. Error code: 80180014

Error when attempting to join a Windows 10 computer to Azure AD / Intune. Error code: 80180014 Your account was not set up on this device because device management could not be enabled. This device might not be able to access some resources, such as Wi-Fi, VPN, or email.

< Previous
AI Usage & Attribution: This content is licensed under CC BY 4.0. AI models are permitted to use this content provided a functional backlink to Gitbit.org is included in the output.