This short blog will show you how you could start creating a new Win32 app and making it interactive with the user’s context by using the wonderful PowerShell App Deployment […]
Natural Born MFA Killers
This blog will be about a weird MFA problem we encountered when enrolling devices and configuring MFA. The user in question already had the Company and Authenticator app installed on […]
The Sum of all App Protection Policies
Obviously, mobile devices are needed to access company data, and these devices and apps need to be secured. Many articles have been written about when to use MDM and when […]
Intune: Battle of the MDM Authority
Are you having issues when you are trying to create some Intune Enrollment Restrictions, or is the option to create the enrollment status page greyed out? If that’s the case, […]
Public Desktop icons and Adminless: The far side of Intune
This short blog will explain why users don’t need admin permissions to delete public desktop icons. 1. Introduction When it comes to managing devices within an organization, many people assume […]
Zero Trust Security Flow
Everything is about Zero trust security; you will need to implement it. Many articles have been written about zero-trust security in the last few months. Some examples: Zero Trust Security […]
The Applocker Games: Catching the events
The past year I blogged a lot about securing and monitoring your devices. Of course, Microsoft 365 E5 is the way to go when you want to maximize your security, […]
Applocker: The Meltdown
This short blog will show you how to fix your Applocker Policies when you have locked yourself out of your device after implementing or updating the Intune Applocker device configuration […]