Microsoft News & Guides Provided By Gitbit

How evil is Copilot?

How evil is Copilot?

I asked Microsoft Copilot questions to determine how evil it was. It failed...

How evil is Gemini?

How evil is Gemini?

I asked Google's Gemini questions to determine how evil it was. It's the evilest one so far.

How evil is ChatGPT?

How evil is ChatGPT?

I asked ChatGPT questions to determine how evil it was. It failed...

How concerned should we be about AI?

How concerned should we be about AI?

How concerned should we be about AI? An average Joe's perspective.

I asked AI how we can live on the moon!

I asked AI how we can live on the moon!

I asked AI how we can create a tourist attraction on the moon. It's answered disappointed me. It threw engineers under the bus.

Building a Game with Copilot in under 1 hour!

Building a Game with Copilot in under 1 hour!

I asked Copilot to create a game. Then I created the game and published it! It took me less than 30 minutes to create the game! Check it out now.

Organization that owns this resource has a policy that prevents access form people in the domain

Organization that owns this resource has a policy that prevents access form people in the domain

Error: The organization that owns this resource has a policy that prevents access from people in the domain you're currently signed in to. If you think you should have access, please contact the person who sent you the link to this resource

Why You Should Always Scan Links in Emails

Why You Should Always Scan Links in Emails

Ever clicked on a link in an email and wondered if it was really safe? That’s where the link scanner comes in. It’s like having a digital bodyguard for your emails, making sure you’re not walking into any traps set by cybercriminals.

Enable Conditional Access policies to block legacy authentication

Enable Conditional Access policies to block legacy authentication

This step-by-step guide will walk you through the process of configuring policies to prevent the use of outdated and auth protocols. Strengthen your security posture by ensuring only modern, secure authentication methods are used.

Create a dynamic group for guest users

Create a dynamic group for guest users

Guest users need to be managed separately. They aren't employees. Make it easy on yourself and create a dynamic group that contains them all.

13 Microsoft 365 Admin accounts best practices

13 Microsoft 365 Admin accounts best practices

Secure you admin account

Ensure sign-in to shared mailboxes is blocked

Ensure sign-in to shared mailboxes is blocked

Ensuring that sign-in to shared mailboxes is blocked is a crucial step in enhancing the security of your organization's email system. Shared mailboxes are often used for collaborative purposes, but allowing direct sign-in can pose significant security risks, including unauthorized access and data breaches. In this article, we will guide you through the process of blocking sign-in to shared mailboxes in Microsoft 365, ensuring your sensitive information remains protected. Learn how to configure mailbox permissions, leverage Azure Active Directory settings, and implement best practices for secure email management. Enhance your cybersecurity posture and maintain compliance with industry standards by preventing unauthorized sign-ins to shared mailboxes.

Block executable content from email client and webmail

Block executable content from email client and webmail

No one should be able to send you executable content via email. Here's how to block it.

Block abuse of exploited vulnerable signed drivers

Block abuse of exploited vulnerable signed drivers

Exploited vulnerable signed drivers are dangerous and one of the most common ways hackers can breach your security.

Block persistence through WMI event subscription

Block persistence through WMI event subscription

WMI event subscription's can cause havoc if you allow them to persist on your devices.

Block execution of potentially obfuscated scripts

Block execution of potentially obfuscated scripts

Script obfuscation is a common technique that malware authors use to hide malware inside scripts.

Block Adobe Reader from creating child processes

Block Adobe Reader from creating child processes

Why does Adobe Reader even need child processes? They should be blocked by default but I digress.

What are ASR rules?

What are ASR rules?

What are ASR rules? Most commonly asked questions answered. How do I enable ASR rules? Where can I find ASR rules? How do I test Microsoft ASR rules? How do you audit ASR? How do I troubleshoot ASR rules? How many ASR rules are there?

Block untrusted and unsigned processes that run from USB

Block untrusted and unsigned processes that run from USB

Unsigned processes running on USB is dangerous. Anyone can put an executable on a USB and attach it to your corporate devices.

Block executable files from running unless they meet a prevalence, age, or trusted list criterion

Block executable files from running unless they meet a prevalence, age, or trusted list criterion

Executable files are dangerous but required to use a computer. By blocking less trusted executables you can help secure your Windows devices.

Block JavaScript or VBScript from launching downloaded executable content

Block JavaScript or VBScript from launching downloaded executable content

Malware writers will often hide the dangerous code by downloading it using JavaScript or VBScript. They must be blocked right away.

Block process creations originating from PSExec and WMI commands

Block process creations originating from PSExec and WMI commands

Why block process creations originating from PSExec and WMI commands? How to block process creations originating from PSExec and WMI commands.

Use advanced protection against ransomware

Use advanced protection against ransomware

Why and use advanced protection against ransomware. Why is it a best practice? How do I set it up with Intune?

Block Office applications from injecting code into other processes

Block Office applications from injecting code into other processes

Blocking Office applications from injecting code into other processes can help protect your computer from malicious code that could potentially compromise your system or steal your personal information.

< Previous > Next