Deep Dive into Co-Pilots: Understanding Architecture, LLMs, and Advanced Concepts

In this blog post I want to deep dive with you how LLMs and CoPilots work, want to give an explanations into the most important aspects and show you some important architecture aspects and concepts. We will not build an own Copilot but I will share also some reference architectures and a tool I created to answer your question with informations of you own Intune tenant. Let me know if I should create also an second blog post to go with you step by step through the process of implementing an own bot which use your own data and a LLM model to help you in your daily business working with Intune.

Read More »

Microsoft Defender for Endpoint: Key Configurations and Best Practices (2/2)

After some weeks here is the second part of my series on Microsoft Defender for Endpoint. In this pert, we delve into essential insights and best practices for Microsoft Defender for Endpoint. I will guide you through important configurations and strategies to enhance your organisations security.

Part 1 (How to enroll device to Microsoft Defender for Endpoint and how does it work)

Read More »

Azure Monitor Agent to monitor Windows devices (1/2) – Setup

In this blog post we want to have an closer look into an way how you can collect data from an client system to monitor them. With endpoint analytics Microsoft provides an very powerful way to analyse clients, remediate potential issues or also detect anomalies in the field. If you are interested in unaggregated and more detailed data to build custom solutions than the log analytics management agent is the right solution for you. This is the first part of an small series with two parts. In this part we will check how this service works and how to setup und in th eother part how you can work with the data.

Diagram shows monitored object purpose and association.
Read More »