How To Export Named Locations In AzureAD Using PowerShell

In this blog post, I will guide you through how to export named locations in AzureAD using PowerShell, as well as how to configure the required API permissions using app registrations in AzureAD. If your organization has many office locations and branches, you might have numerous IP addresses added to your named locations in Azure … Read more

How To Create Filters In Endpoint Manager

Filters provide a convenient and efficient way to target specific devices, unlike the traditional method of using “dynamic groups”, which can take time to update when new or updated devices are added. With filters, we can quickly and easily target devices without having to wait for membership lists to be updated. This makes filters a … Read more

Silently Enforce Bitlocker Using Endpoint Manager (Intune)

Bitlocker is one of the most essential security features to deploy to your windows devices. BitLocker Drive Encryption is a security feature that protects against data theft or exposure on lost, stolen, or improperly decommissioned computers. It integrates with the operating system to provide enhanced protection for files and systems, making it difficult for unauthorized … Read more

How To Configure Update rings for Windows using Intune

In today’s blog I will quickly guide you through how to configure update rings for windows using intune. It is important to keep your organization’s Windows version up to date in order to reduce the risks and vulnerabilities that are constantly being discovered. By running the latest version of Windows, you can decrease the chances … Read more

Block external forwarding in Exchange Online

External forwarding should always be disabled by default in any tenant, as it is commonly used by intruders to extract confidential emails from key individuals within the organization. Disabling this feature can help prevent unauthorized access to sensitive information and protect your business from potential security threats. One example of these malicious inbox rules could … Read more

MDM User Self-Enrollment Using Deep Links On Windows 10

This will be a very short, but yet useful blog post about making the self-enrollment end-user experience better for your users.Keep in mind that this way of enrollment is not intended for large scale enterprises. Today we will take a look at how you can use “Deep links” to help guide your users to self-enroll … Read more

Protect SharePoint Data From Unmanaged Devices.

When working with confidential files in any company size it’s very important to protect data from leaving the company to unwanted people or competitors. Microsoft has a lot of different technologies to help this from happening, but today we are taking a look at securing SharePoint data from unmanaged devices. There is two settings we … Read more

Configure Manged Favorites For Microsoft Edge Chromium

If your organization has many internal web services or frequently used websites that your users need quick and easy access to, the managed favorites feature could be a useful way to make these websites easily available to end-users. By setting up managed favorites, you can ensure that your users have quick and convenient access to … Read more

Go Passwordless With Microsoft Authenticator.

Microsoft Authenticator passwordless sign-in (PREVIEW) is a free tool that allows you or your users to go passwordless without much effort. By using this feature, you can improve security and reduce the burden of managing passwords, making it easier and more convenient for users to access their accounts. Here is a quick guide on how … Read more

Configuration of Subdomain And Manage Who Can Create Teams.

When working with Teams in Microsoft 365, it is easy for users to create teams, which can lead to an excessive number of unnecessary or inappropriate teams for your organization. Another issue with Teams is that when a new team is created, its name is used as the username and email address, potentially preventing the … Read more