This blog will be about “something” old we need to beware of. This blog has […]
Code Name: The Log Cleaner
This blog will show you how to deal with Sensitive Information (such as passwords) that could end up in the Intune Management Extension’s Agent Executor Log files. Some time ago, I wrote a blog about implementing LAPS with Intune using Proactive Remediations.
The Last Days of Custom Compliance Policies
This blog will show you the nice wonderful addition to Intune, called the Custom Compliance […]
Back to the App Protection Policies
This very small blog will be about the improvements in the Target Policy in App […]
The isEncrypted with Steve Zissou
This short blog will be about a question I received on Linkedin. The question was […]
The Death of Compliance
This blog will show you how Device-Based Conditional Access works and how it determines if […]
Remote App: The Last Whish
In one of my older blogs, I talked a lot about how and why you […]
Those who wish me ADAL/MSAL
This blog will contain information about MSAL, ADAL, OAuth, and some tokens. I will also […]
The Quick and the PowerShell Bug Bounty
This blog will be about setting up the combined MFA security information registration experience and […]
PowerShell: An unexpected Monitoring Journey
This short blog (but with a nice idea I hope and some PowerShell scripts) will […]