Browsed by
Category: Powershell

The Death of Compliance

The Death of Compliance

This blog will show you how Device Based Conditional Access works and how it determines if your device is compliant or not!. I have been writing about this topic a little bit in one of my older blogs. But after reading it again, I had the feeling that it was still missing some important information or examples. So here we go! And while at it, I will also show you how to fake compliance! Background information about Device based Conditional…

Read More Read More

Remote App: The Last Whish

Remote App: The Last Whish

In one of my older blogs, I was talking a lot about how and why you don’t always need to go hybrid (HAADJ). I also showed you the kind of problems you could run into. This blog will show you how to make sure your old legacy apps (which are configured as Remote Apps) can be easily deployed to your AADJ devices, so you won’t need the go Hybrid 😛 Please read my blog about HAADJ before you continue…pretty please…

Read More Read More

Those who wish me ADAL

Those who wish me ADAL

This blog will contain information about MSAL, ADAL, OAuth and some tokens. I will also show you how you could use MSAL authentication with PowerShell to change the Device Category in Intune I will divide this blog into multiple parts Information about ADAL and MSAL Deprecated and ending Support Information about the Token Taking a good look at the access token Comparing the ADAL and MSAL methods Using MSAL to change the device category in Intune 1.Information about ADAL and…

Read More Read More

The Quick and the PowerShell Bug Bounty

The Quick and the PowerShell Bug Bounty

This blog will be about setting up the combined MFA security information registration experience and while configuring it with PowerShell, I will show you how I ended up enabling it/or disabling it in the wrong tenant. Yes, you are reading it correctly! While I am showing you what got me the bug bounty, I will also show you some parts of our own tenant Deployment script. I will divide this blog into 3 parts: The combined security information registration experience…

Read More Read More