Skip to content
  • Latest Posts
  • Contact
  • Buy Rudy Some Membeer
  • About Rudy

Guardians of the Local Admin rights

Posted on: September 9, 2020July 31, 2024Privileged Access Workstation , Adminless , Intune , Microsoft 365 Business

Granting your users local admin permissions when deploying Windows 10 is really really best practice…I’m joking, no it’s not! I must be saying this a lot lately. You need to […]

The never-ending Command Prompt

Posted on: September 4, 2020September 12, 2024Intune , Microsoft 365 Business , Privileged Access Workstation

This blog will be about some new ADMX-backed policies for MDM to block access to the Command Prompt (DisableCMD). After trying them out, I encountered some weird behavior. 1. Introduction […]

Things to block in Denver When You’re an IT Admin

Posted on: August 20, 2020September 4, 2024Azure Ad , Intune , Microsoft 365 Business , Privileged Access Workstation , Proactive Remediations
Things to block in Denver When You’re an IT Admin

In this updated guide, we’ll explore effective strategies for blocking access to administrative tools such as Regedit (Block Regedit), the Command Prompt (Block CMD), and PowerShell (Block PowerShell). We’ll break […]

Interview with the ASR rules

Posted on: August 19, 2020December 10, 2024Microsoft 365 Business , Intune , Microsoft Defender , Privileged Access Workstation

Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know the caveats. The sun was probably shining when you configured your ASR rules! After deciding […]

The Fellowship Of Group Labelling

Posted on: August 3, 2020December 6, 2021Sensitivity Labels , Data Governance , Microsoft 365 Business , Microsoft Teams , Powershell

Labelling your data with sensitivity labels is the way to go. Confidential data within your organization needs to be labelled with a proper sensitivity label. You can do this manually […]

No Country For Not Monitoring

Posted on: July 28, 2020December 27, 2021Microsoft 365 Business , Privileged Access Workstation , Solarwinds

SIEM (security information and event management) is a set of tools used to monitor, identify, analyze and record security events. Of course, you could use Azure log analytics and Azure […]

Microsoft and Solarwinds, the holy grail

Posted on: July 24, 2020August 3, 2020Microsoft 365 Business , Privileged Access Workstation , Solarwinds

Solarwinds announced a collaboration with Microsoft to enhance monitoring and management. And since we use Solarwinds as our RMM solution, I think that’s really nice. In this blog, I will […]

Lock, Stock and Office 365 ATP Automation

Posted on: July 2, 2020December 6, 2021Microsoft 365 Business , Powershell , Privileged Access Workstation

Securing your email with Office 365 Advanced Threat Protection (ATP) / Microsoft Defender for Office 365 is like putting a cage around your email. You might ask yourself: Why do we […]

The Forgotten Fruits of Securing your Windows Endpoints

Posted on: July 1, 2020September 7, 2024Privileged Access Workstation , Intune , Microsoft 365 Business
The Forgotten Fruits of Securing your Windows Endpoints

Securing your endpoints is essential to protect your systems from various security threats. This blog will walk you through the steps you need to take to ensure your endpoints are […]

My first blogpost :)

Posted on: March 22, 2020June 25, 2020Device Enrollment , Conditional Access , Intune , Microsoft 365 Business

I have been thinking a lot about creating a website and to start blogging. The time is now. This a video (in dutch…) how I configured one of my test […]

Posts pagination

Previous page Page 1 Page 2 Page 3

Categories

  • MMP-C
  • Attestation and Compliance Series
  • EPM
  • Declared Configuration Enrollment
  • Autopilot
  • WinDC
  • Intune
  • Continue to Sign in Prompt Part 2: Disable the DMA SSO Compliance
  • The “Continue to Sign in Prompt” That breaks the SSO
  • Declarative Device Management with Intune
  • Why Using a DEM Account for Windows Autopilot is a Bad Idea
  • Device Query for Multiple Devices, Device Inventory, and Single Device Query: Connecting the Dots
Theme Alaska Blog by Kantipur Themes