Recent Blog ArticlesNewest TopicsMost LikesTagged:TagApplication Control for Business, Schema Definition Watching my miniature schnauzer, Raven, explore my backyard, I’m reminded of the importance of having a clear set of rules and guidelines. Just like Raven has her own schema to navigate her environme...Deploying Microsoft Defender for Identity When Raven and I are out in my backyard, she's always on high alert, her keen senses picking up on every subtle change in her environment. Just like Raven, Microsoft Defender for Identity (MDI) is co...How to Create an xPath Filter for a Data Collection Rule In the world of data collection, efficiency is key. Just as my miniature schnauzer buddy, Raven, has a knack for sniffing out the most interesting scents while ignoring the mundane, an xPath filter c...Archive MDE Data to Event Hubs to ADX Embark on a journey through the digital landscape as we uncover the secrets of exporting data from Defender for Endpoint to Azure Storage. Whether it’s basking in the cloud’s expanse or lying in wait...Monitoring for an Azure Server Going Offline Azure Monitor is a beneficial tool that has low costs for logs that are already in the tool. The main expenses for Azure Monitor come from ingesting the logs, so using the monitoring tool for data th...Migrating from the Azure MMA to AMA Agent I have another conversation about the sunset of the Microsoft Monitoring Agent (MMA). Back on November 13, 2023 I posted and article on how to do a bulk removal of the Azure MMA agent, but before you...Azure MMA Agent Bulk Removal The Legacy Azure Microsoft Monitoring Agent (MMA) is scheduled for retirement in August 2024. To ensure a smooth transition and prevent duplication of logging data, it is strongly recommended to repl...Forward On-Premises Windows Security Event Logs to Microsoft Sentinel There is no need to load an agent on every device to capture the Windows Security Event Logs from your on-premises Windows workstations & servers. Windows hosts already have this built into the opera...Manage USB Devices on Windows Hosts Microsoft has built in security controls in our modern o/s’s to assist our customers in controlling the use of defined USB devices. The explanation below covers USB storage, but it really pertains to...BitLocker, Intune, and Raven Microsoft provides Windows 10 BitLocker management from both Azure (via Intune) and SCCM with enhanced features expected to be released in the second half of 2019. Management of Enterprise BitLocker...