This blog will be about my experience using a dynamic group for the Windows Autopilot Profile assignment and how processing the dynamic group membership takes longer than we want it […]
Remote Wipe: The Next level
This blog will show you how you can wipe all devices even when you don’t have Intune (yet) 1. Introduction The power of remote wiping your device is great to […]
Birds of Printer Nightmares
When I started this blog, it was all about showing you the options you have when you want to make sure the end user (without admin permissions) can still install […]
How to Force Sync Microsoft Edge Settings Using Custom ADMX in Intune
Managing browser settings across an organization is a critical aspect of IT management, especially when it comes to ensuring consistency, security, and compliance. Microsoft Edge, with its deep integration into […]
Fantastic PowerShell and where to find the Conditional Access Rules
Automating your tenant deployment is crucial in preventing human mistakes. One of the many examples you could automate would be the deployment of the Conditional Access Rules. Looking back at […]
The Applocker Dilemma
This blog will discuss how a “NotConfigured“ AppLocker policy can come back to haunt you. I updated it after responding to a question on Reddit. 1. Introduction Implementing AppLocker is […]
A million ways to implement ISO 27001 controls.
After being inspired by Alexander Fields about the CIS framework and Microsoft 365, I took a deep dive into mapping ISO 27001 to a zero-trust modern workplace. I’ll try to […]
The Curious Case of the Vanishing Alias: A Dive into Microsoft Entra Connect and Email Aliases
Sometimes, a seemingly straightforward task becomes an unexpected troubleshooting adventure. In today’s story, we’re diving into a peculiar issue with email aliases and how Microsoft Entra Connect (previously known as […]
Continuous Access Evaluation: Rise of the Claim challenge
Hi, Refresh tokens, Hi lag when Terminating users or setting a new password. Welcome continuous access evaluation (CAE), bye lag (1-hour refresh token) Continuous Access Evaluation is implemented by enabling […]
MCAS: Judgement Day
This blog will be about how I broke my own Microsoft Cloud App Security instance. Cloud App Security is a fantastic product, it can help you discovering and protecting all […]