Tag: Intune

Find LOG4J with Intune Proactive Remediations

How to use LOG4J and Intune Proactive Remediations to start looking for potentially vulnerable systems.

Query Defender for Endpoint: Part 2

Defender for Endpoint making a Client Secret to access Data, can sometimes be useful if properly controlled.