Browsed by
Category: Powershell

The Last Days of Custom Compliance Policies

The Last Days of Custom Compliance Policies

This blog will show you the nice wonderful addition to Intune, called the Custom Compliance Policy. This blog will be updated along the way as it’s new and this blog is just describing my own first attempts with these custom compliance policies and my opinions! With the custom compliance policy, it’s (should be?) way easier to measure compliance. The Custom Compliance policy The PowerShell Detection Script The JSON The Results Some important stuff Manually enforcing a Custom Compliance Check Scheduling…

Read More Read More

Back to the App Protection Policies

Back to the App Protection Policies

This very small blog will be about the improvements in the Target Policy in App protection and how to update your JSON files to automate the deployment I will divide this blog into multiple parts Background information Changing the JSON 1. Background information It’s wonderful to see Microsoft Is improving the App Protection Policies. It’s now possible to select “All apps” or “All Microsoft Apps” or even “Core Microsoft Apps”. This will definitely save you some time when you are…

Read More Read More

The isEncrypted with Steve Zissou

The isEncrypted with Steve Zissou

This short blog will be about a question I received on Linkedin. The question was about Graph Explorer and why it wasn’t returning the OMA-URI values configured. It only showed some nice **** (IsEncrypted Value) I will divide this blog into multiple parts Replicating the Problem What Happening? Fixing the Problem Applicatation VS Delegated Permissions Microsoft Has fixed the Application Permissions Issues! I guess Microsoft didnt fix all the Application Permission issues! 1.Replicating the Problem If we need to fix…

Read More Read More

The Death of Compliance

The Death of Compliance

This blog will show you how Device Based Conditional Access works and how it determines if your device is compliant or not!. I have been writing about this topic a little bit in one of my older blogs. But after reading it again, I had the feeling that it was still missing some important information or examples. So here we go! And while at it, I will also show you how to fake compliance! Background information about Device based Conditional…

Read More Read More