Azure Key Vault Best Practices
Introduction Azure Key Vault is a service that allows you to securely store and manage encryption keys, secrets, certificates, and other sensitive data in the… Read More »Azure Key Vault Best Practices
Introduction Azure Key Vault is a service that allows you to securely store and manage encryption keys, secrets, certificates, and other sensitive data in the… Read More »Azure Key Vault Best Practices
If you are an IT administrator who wants to prevent your users from accessing the Internet using Internet Explorer 11 (IE11) as a standalone browser,… Read More »Disable Internet Explorer 11 using Microsoft Intune
Introduction If you are looking for a way to synchronize your on-premises Active Directory (AD) with Azure Active Directory (Azure AD), you might be wondering… Read More »Azure AD Cloud Sync or Azure AD Connect – What to Choose ?
Introduction As an Intune administrator, you may have struggled with the complexities involved in deploying several applications, policies, and other management objects to your organisation’s… Read More »Microsoft Intune Policy Sets
How to Protect Your Priority Accounts with Microsoft Defender for Office 365 If you are a Microsoft 365 administrator, you probably know how important it… Read More »Protect Priority Accounts using Microsoft Defender for Office
The My Groups page is a feature of Azure AD that allows you to review and manage your existing groups and create new groups1. If you’re an end… Read More »What’s New in Azure AD – New My Groups Experience
Introduction to Microsoft Defender Antivirus Updates Channels Keeping Microsoft Defender Antivirus up-to-date is important to make sure that your devices have the latest technology and… Read More »Manage Microsoft Defender Antivirus Updates Channels using Microsoft Intune
Potential benefits: Access to files from anywhere: When user profiles are stored on a local computer, users can only access their files from that device.… Read More »Move User Profiles to One-Drive Silently using Intune
Introduction In one of my previous post, I talk about the steps to isolate device from the network in case of any suspicious activity on… Read More »Restrict app execution using Microsoft Defender for Endpoint
Introduction One of the features Microsoft Defender for Endpoint offers is device isolation, which helps prevent the spread of malware and other threats within an… Read More »Isolate Device from Network using Microsoft Defender for Endpoint