eGroup Awarded CRN’s MSP 500 List For 7th Year
eGroup | Enabling Technologies Recognized by CRN’s MSP 500 List for 7th Year eGroup | Enabling Technologies Recognized on CRN’s 2023 MSP 500 List “Managed services offer a path for businesses of all sizes to remain efficient and flexible as they grow. The solution providers on our 2023 MSP 500 list are bringing innovative managed […]
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 2)
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 2) Introduction This is the second article in this series. In the first part, we discussed the need to properly configure your Intune settings and policies for Teams Android devices. Here we will go over a few more items […]
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 1)
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 1) Introduction At eGroup | Enabling Technologies, we define as a best practice the implementation of Microsoft Intune to provide device management used by authenticated users in Microsoft 365 tenants. The Intune component enrolls these devices and applies device […]
Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs
Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs Introduction Admittedly, this title is misleading, but it did get you to look at this article! This is part of our series on securing AudioCodes SBCs based on eGroup | Enabling Technologies’ security mantra of “Trust No One, Harden Everything” and guidance provided by AudioCodes. […]
Defuse the Technical Debt Time Bomb
Defuse the Technical Debt Time Bomb While it has certainly been in the news more often lately, technical debt has been a challenge for organizations since the days of vacuum tubes. Other than the recent air travel examples in the last few months, there is a constant stream of articles about health care providers, colocation […]
The Pros and Cons of Threat Hunting
The Pros and Cons of Threat Hunting Assuming Breach Stealthy supply chain attacks like Solorigate and Log4j have shined a light on the importance of assuming breach. When these attacks hit the news, vendors and analysts often suggest to “hunt for Indicators of Compromise.” IT and security pros spend nights and weekends determining the extent […]
Nonprofit IT Executives Talking Azure
Nonprofit IT Executives Talking Azure In a recent case study about his organization’s journey to the Microsoft cloud, a nonprofit leader stated, “Technology can be the great equalizer.” That evidence was again on display in a recent panel hosted by Microsoft and eGroup | Enabling. Panelists included IT leaders representing four non-profit organizations, with topics ranging […]
Using Regular Expressions to Build a Microsoft Purview Custom Sensitive Information Type
Using Regular Expressions to Build a Microsoft Purview Custom Sensitive Information Type Introduction A colleague of mine needed to create a Microsoft Purview custom Sensitive Information Type (SIT) for a client– The client wanted to use this SIT as part of their implementation of Microsoft Purview. The client needed the SIT to match on occurrences […]
Configuring Internet Facing Firewall Rules for Microsoft Teams Direct Routing
Configuring Internet Firewall Rules for Microsoft Teams Direct Routing Introduction This is the fourth in a series of articles on hardening AudioCodes Session Border Controllers (SBCs). The series is mostly following the guidance provided by AudioCodes. These configuration notes are referenced at the end of this article. These articles are components of eGroup | Enabling […]
How to Save on Sentinel’s Recurring Costs
How to Save on Sentinel’s Recurring Costs While Microsoft Sentinel is a powerful tool to identify and resolve sophisticated cyber attacks, organizations who pilot without taking preliminary steps to minimize costs might experience some sticker shock. This blog outlines some of the more obvious and subtle optimizations that are often missed. Don’t Go with Pay-As-You-Go […]