Is my perception of improved security by restricting access to an MS365 tenant/associated apps on per-device basis misguided? Why?

Receiving guidance from a contractor that restricting unknown devices (regardless of MFA, location, etc.) to an Azure tenant does not improve security in any meaningful way, and just creates a headache for the administrator who needs to ru… Continue reading Is my perception of improved security by restricting access to an MS365 tenant/associated apps on per-device basis misguided? Why?

What are the pitfalls of adding a corporate eSIM to an unmanaged employee device in lieu of land-line phones?

Instead of having a landline at each employee’s desk, allow them to add an eSIM to a compatible personal cell phone. (If possible, disable SMS for the added eSIM so it is acting as a replacement for the desk phone.)
Unmanaged phones are of… Continue reading What are the pitfalls of adding a corporate eSIM to an unmanaged employee device in lieu of land-line phones?

Is the ability to export HKEY_LOCAL_MACHINE\SAM and HKEY_LOCAL_MACHINE\SYSTEM as .reg files a security concern?

I am concerned that if it is possible to copy these as .reg files (without privs) and then (on another machine) reverse the .hiv files from them… this would probably be bad, which makes me think it’s likely not possible.
Has this/is this… Continue reading Is the ability to export HKEY_LOCAL_MACHINE\SAM and HKEY_LOCAL_MACHINE\SYSTEM as .reg files a security concern?