While using Conditional Acces, we can require specific requirements for users, devices, apps, countries (locations), device states, etc. This gives us the opportunity to allow
Category: Security

Intune has great features, why don’t we combine them!? In this post I’ll show you how you can require specific ASR (Attack Surface Reduction Rules)

In this blog I’ll show you step by step instructions for data protection on unmanaged devices. We can do this using Microsoft Defender for Cloud

The SMTP Authentication protocol (in Exchange Online) is the most attacked (legacy) protocol now a days. This happened since Microsoft is currently disabling all other

While most people rely on Azure AD Sign-in logs, there are some additional features which are worth implementing in your tenant. One of these features

Require dynamic lock as part of your compliance policy using custom compliance policies.

Have you ever wondered what to do when you lost admin access to your Tenant? Have u got a panic plan or any idea how to act when there’s absolutely no admin access to your tenant anymore?

Last week I encountered a strange issue while connecting to a customer it’s tenant via CSP (Partner Center). It seemed to start since I’ve migrated

A list of my most used proactive remediations for intune managed devices.

Last week I was scheduled to implement Self Service Password reset for a client. Enabling Self Service Password Reset (SSPR) is not quite difficult but