Mindcore Techblog

Let’s talk about Client Management, Security and IT Infrastructure

Remote Help just became more secure

Microsoft Remote Help is a powerful tool that allows users to get technical support and assistance from your company’s IT Pros without leaving the comfort of their own homes or offices. With Microsoft Remote Help, users can connect remotely to a support technician who can troubleshoot, diagnose, and solve technical

Continue to read »

Be aware of the new cookie monster – AiTM

So, for the ones who thought that MFA was the holy grail, bad news has arrived. Microsoft is seeing a rise in attacks based on AiTM – Adversary in The Middle. Unfortunately, these attacks have proven that MFA is not enough to protect users against credential theft, because they leverage

Continue to read »

Feeding the Beast: Data Ingestion with Microsoft Sentinel

Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that enables organizations to collect, analyze, and respond to security events across their enterprise (for an introduction please see the first post in this series). Data ingestion is a critical component of the Sentinel platform, as it allows

Continue to read »

The Sentinel Awakens: Microsoft Sentinel Introduction

Microsoft Sentinel is a cloud-native security information and event management (SIEM) system that provides real-time threat detection and response as well as Security orchestration, automation and response (SOAR). It is a powerful tool that allows security teams to collect, analyze, and act on security data from multiple sources. In this

Continue to read »

Write Smarter, Not Harder: A Beginner’s Guide to Markdown

When it comes to creating content online, Markdown is a popular and powerful tool that can make formatting text easier and more efficient. This lightweight language can be used to create everything from simple notes and emails to full-blown websites, or assist with git CI/CD and blog posts. What is

Continue to read »

PowerShell App Deployment Toolkit – Part 4

How can you work smarter in your application deployment? By asking for the software state or something else on the device, before trying to execute whatever you want to install. We look at the 3 functions to master registry modification. How to use If you did not see the chapter

Continue to read »
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories

Follow on SoMe