The Driver Automation Tool has been one of those solutions that keeps giving over the years, and when I say that, I mean keeps giving me a job to do.. by keeping it up to date. Today I am announcing with the new V8...
Some time ago, Microsoft announced that the Microsoft Intune PowerShell enterprise application, that many of us had made use of throughout the years, would be removed. This was stated in a message that read similar to:...
I have not worked with multi-language Windows for a while, which seems to have changed a lot compared to Windows 10, I am happy that I found Peter Klapwijk’s blog post and his script . If you are still using the...
Intune App Factory was originally developed and instructions for how to set it up were written when Azure DevOps didn’t support Managed Identities or Workload identity federation. However, recently, users of...
Recently there have been concerns raised around Autopilot methods being used to side step security measures, and even leave organisations vulnerable to rogue onboarding of devices with no security sanity check measures...
In this post we will do some digging on Win32 app state messages and look at the compliance state and enforcement state messages stored in the local registry for win32 app policies processed by the client. We will also...
The long waited for Endpoint Privilege Management is finally in public preview! This post is about my first look at this feature, so not a deep dive post. If you need more details on EPM, please read more from the...
Hi there! I am new to the MSEndpointMgr team and thrilled to be here! In this blog post, we will look into Logic Apps and how we can achieve a governance-free model to how we can utilize this kind of low/no code...
Manage Windows Hello for Business (WHfB) with Intune is very “easy”, you have so many options: At device enrollment: Tenant-wide policyAfter device enrollment, at least four methods: Endpoint Security >...
In this post we will look at the Office File Transfer feature and implement a simple solution to prevent “one way” that users can leak corporate data. Table of ContentsMobile Devices – The Trojan Horse...