Intune

Using Intune Custom Compliance policies – how they work and how to discover installed software versions

A client I recently worked with wanted to make sure only compliant devices could access corporate resources. This is a fairly common request and implementation, but they also wanted a compliance policy to make sure certain security applications were installed. This post will look at how custom compliance policies work and show you how to […]

Using Intune Custom Compliance policies – how they work and how to discover installed software versions Read More »

Move from per-user MFA to Conditional Access MFA in Azure AD

More often than not, I see both per-user MFA and Conditional Access MFA enabled in Azure AD tenants. There seems to be a misconception amongst IT admins that by disabling per-user MFA, users will need to re-register their MFA authentication methods. So, admins end up leaving per-user MFA enabled and also creating a Conditional Access

Move from per-user MFA to Conditional Access MFA in Azure AD Read More »

BitLocker state of encrypted, but no Key Protectors and Protection off. Resolving with Intune.

This post describes a recent issue I had with BitLocker drive encryption. It started with Hybrid AAD joined devices showing successfully encrypted, but keys are not uploading to Azure AD, and the encryption settings were not really being deployed. Further investigation revealed a strange BitLocker state on most of the machines. If you find yourself in

BitLocker state of encrypted, but no Key Protectors and Protection off. Resolving with Intune. Read More »

Why your business needs Azure AD & Microsoft Endpoint Manager, and How to Plan your Migration

As organizations continue to expand their remote workforces, those refusing to adopt modern cloud solutions are neglecting tools that enhance mobility and productivity. They’re also putting corporate data at higher risk of compromise by not taking advantage of modern cloud security solutions. It wasn’t that long ago where nearly all employees were reporting to an

Why your business needs Azure AD & Microsoft Endpoint Manager, and How to Plan your Migration Read More »

Find successful basic authentications quickly with PowerShell

This is a quick post, but useful for anyone who has not stamped out basic authentication in their environment. Or perhaps you’ve inherited several new clients, or need to identify this across many clients. In any case, you can always use the manual method of signing into the Azure GUI and filtering sign-in logs, which

Find successful basic authentications quickly with PowerShell Read More »