Cloud Kerberos Trust for Windows Hello for Business is the apex of single sign-on solutions for your Windows devices. In this Trilogy you can expect to learn the what, the how and the wow! Table of ContentsThe story so...
Finding Devices in need of Replacement To start the device refresh process, endpoint managers first need to identify endpoints for replacement this year. Many organizations go about this in their own ad hoc way. For...
In this post I will revisit Co-management workloads, capabilities and take a walk down memory lane. BackgroundConfiguration Manager “The steady ship”Intune “The Cloud”Co-management “The...
Importance of BitLocker While we often speak of cyber security in terms of access to privileged accounts and our organization’s systems, there is another piece of the security puzzle that is just as important...
Hi there! I am new to the MSEndpointMgr team and thrilled to be here! In this blog post, we will look into Logic Apps and how we can achieve a governance-free model to how we can utilize this kind of low/no code...
If you have ever having issues with Autopilot or Enrollment Status page failing or timing out due to issues with Office installation, this blog post is for you. Over the years working in this area, the Office CSP has...
Manage Windows Hello for Business (WHfB) with Intune is very “easy”, you have so many options: At device enrollment: Tenant-wide policyAfter device enrollment, at least four methods: Endpoint Security >...
In this blog post we cover the unusual characteristics of the Intel Optane drive, and how we need to approach task sequence builds to ensure we do not hit an unforeseen issue when it comes to in-place upgrades later in...
In this quick post we will be removing built-in Windows 11 apps, for all users, and optionally showing you how to leverage a “Cloud-Source” as a reference file to select apps for removal. Table of...
In this post we will look at the Office File Transfer feature and implement a simple solution to prevent “one way” that users can leak corporate data. Table of ContentsMobile Devices – The Trojan Horse...