Dive into Microsoft Graph authentication with PowerShell. In this blog we explore OAuth flows, PKCE security, and token handling. Learn how to build a secure auth flow from scratch and why the SDK might still be the...
By now, you’ve probably heard the standard Copilot-Ready preparation advice: lock down data, control access, and prevent oversharing. That’s all critical—but it’s only half the equation. Even with perfect data...
Data collection rules allow you to filter Intune Management Extension (IME) events captured by Defender, ensuring only pertinent data is sent to Azure Sentinel. This approach helps manage ingestion costs while...
In this post we take a small deep-dive into the Intune MDM certificate and talk about OID's and how they can be leveraged to elevate your trust in the device identity.
Some time ago, Microsoft announced that the Microsoft Intune PowerShell enterprise application, that many of us had made use of throughout the years, would be removed. This was stated in a message that read similar to:...
Following Maurice’s recent post on Delivery Optimization Troubleshooting, a thread on X and it is something I have seen time and time again, the issue of course is how proxies such as Zscaler are configured. This...
I have not worked with multi-language Windows for a while, which seems to have changed a lot compared to Windows 10, I am happy that I found Peter Klapwijk’s blog post and his script . If you are still using the...
Greetings, fellow IT admins! Repackaging setup files and editing your Win32 app again can be tedious and time-consuming. Thankfully, I bring you good news! There is a way to deploy a Win32 app and have it always...
Intune App Factory was originally developed and instructions for how to set it up were written when Azure DevOps didn’t support Managed Identities or Workload identity federation. However, recently, users of...
Recently there have been concerns raised around Autopilot methods being used to side step security measures, and even leave organisations vulnerable to rogue onboarding of devices with no security sanity check measures...