While using Conditional Acces, we can require specific requirements for users, devices, apps, countries (locations), device states, etc. This gives us the opportunity to allow

Intune has great features, why don’t we combine them!? In this post I’ll show you how you can require specific ASR (Attack Surface Reduction Rules)

In this blog I’ll show you step by step instructions for data protection on unmanaged devices. We can do this using Microsoft Defender for Cloud

The SMTP Authentication protocol (in Exchange Online) is the most attacked (legacy) protocol now a days. This happened since Microsoft is currently disabling all other

While most people rely on Azure AD Sign-in logs, there are some additional features which are worth implementing in your tenant. One of these features

The idea Since a while I’m testing/playing around with Windows 365 Cloud PC’s. For performance purposes I would like to reboot and/or reprovision Windows 365

Require dynamic lock as part of your compliance policy using custom compliance policies.

Devices being managed with Endpoint Manager (Intune) can be upgraded via a Feature Update policy. The blog shows you how to upgrade to Windows 11 22H2.

Have you ever wondered what to do when you lost admin access to your Tenant? Have u got a panic plan or any idea how to act when there’s absolutely no admin access to your tenant anymore?

Last week I encountered a strange issue while connecting to a customer it’s tenant via CSP (Partner Center). It seemed to start since I’ve migrated