Posts

Showing posts from February, 2024

Enable/Disable built-in Administrator account using Intune

In this tutorial, we will look at the steps to enable and disable the built-in administrator account using Intune on Windows 10/11 devices. It is widely known that the built-in administrator account on Windows devices is disabled. That is because the administrator account has complete control over the computer and can bypass all user access control (UAC) safeguards. The built-in administrator account has a specific and well-known security identifier, and some attacks target that particular SID. As a security measure, Microsoft disables the Administrator account on new Windows installations. Read the following guide to find out the reasons why you should not enable the default administrator account. Although you can manually enable the built-in administrator account on Windows devices, Intune can do it for you on multiple devices, which saves the time of your IT team. If your organization requires it, you can also disable the built-in administrator account either through Intune or Group

Enable Edge TyposquattingChecker with Intune & GPO

 Typosquatting, also known as URL hijacking or domain mimicking, is a form of cybercrime that involves registering domain names that are strikingly similar to well-known websites. Learn how you can configure Microsoft Edge TyposquattingChecker using Microsoft Intune and Group Policy. This guide shows you how to configure Edge TyposquattingChecker for users using Microsoft Intune and Group Policy. By default, Edge Website Typo Protection is enabled, but you can enforce a policy to prevent users from turning it off. Typosquatting, also known as URL hijacking or domain mimicking, is a form of cybercrime that involves registering domain names that are strikingly similar to well-known websites. The typosquatting cybercrime takes advantage of users who type web addresses incorrectly, directing them to imitation websites rather than their intended destinations. Once they arrive at these imitation websites, users frequently enter sensitive information or download malware without their knowledg