Remote workstations are targeted as much as your servers. Given today’s threats, it’s never been so important to have a multi-pronged endpoint security strategy.
How we can help:

Are your security measures sufficient for today’s threats? Take the 5-minute Ultimate Endpoint Security Assessment and see how your business scores!
Navigating the Essential Eight Maturity Model
How we help you address each mitigation strategy outlined in the Essential Eight.
Mitigation Strategy | EF Solution |
---|---|
Application Control | Our partner Airlock Digital provides best of breed application allow-listing and control |
Patch Applications | Our partners Patch My PC and Automox automate third-party application patching, removing the need to manually package and deploy application updates |
Configure Microsoft Office macro settings | We use Group Policy or Device Configuration Profiles in Microsoft Endpoint Manager (Intune) to implement ASCS compliant Microsoft Office macro settings |
User Application Hardening | We use Group Policy or Device Configuration Profiles in Microsoft Endpoint Manager (Intune) to implement ASCS compliant Application Hardening settings for Office, Web Browsers and PDF software |
Restrict Administrative Privileges | We use Group Policy or Device Configuration Profiles in Microsoft Endpoint Manager to restrict the use of Windows administrative privileges. CrowdStrike Falcon Discover helps our customers identify local administrator accounts in real-time, and enforce compliance rules |
Patch Operating Systems | Operating System patches can be delivered via Microsoft SCCM, Microsoft Endpoint Manager (Intune), or via our partner Automox. CrowdStrike Spotlight provides real-time insights into operating system and third-party application vulnerabilities, allowing our customers to prioritise which patches are deployed, and visibility into how many devices are affected |
Multi Factor Authentication | We control and enforce Multi Factor Authentication using Conditional Access rules in Microsoft Azure, or via a third-party identity providers such as Okta. We have helped organisations tailor their Multi Factor Authentication configuration to follow the ‘north star’ recommendation of ’only one prompt, per user, per device, per password change’ |
Regular Backups | While we do not specialise in backups, we partner with several consulting firms who do, and can help you comply with this mitigation strategy |
Securing your endpoints is now more important than ever
Make sure your project goals consider:
24/7/365
Threat Hunting &
Incident Response
powered by CrowdStrike’s global SOC
Learn How We Have Helped Leading Organizations
Coming Soon. Want to chat about our recent projects?
Ask Us
about what worksBuloke Shire Council implements a modern workplace utilising Microsoft 365 services
100%
cloud-based productivityMcConnell Dowell modernises device deployment saving $72,000 annually
100%
cloud-based productivityComing Soon. Want to chat about our recent projects?
Ask Us
about what worksLet’s Make Things Happen
We’re always happy to chat about our latest projects, new advancements, and what’s working well for our clients.
“The support from Endpoint Focus is always reliable and timely. Our annual notebook replacements run like clockwork, and we’ve continually improved our security thanks to their advice. We can turnaround new applications to teachers and students in days, where it previously took much longer.”
James Sze
IT Systems Admin, Marymede Catholic College