• All Post
  • General
  • Microsoft 365
  • Microsoft Azure
  • Modern Workplace
Lifecycle Workflow Custom Task Extension for Assigning On-Premise Groups to Users

19. February 2025

Introduction Managing user lifecycle events, such as onboarding and role changes, is a critical aspect of identity governance. Microsoft Entra ID Governance provides Lifecycle Workflows, enabling administrators to automate user-related tasks. However, Entra ID Governance workflows do not natively support assigning on-premises Active Directory (AD) groups to users. To bridge...

Linux Bash Script Deployment with Intune

11. April 2023

Introduction Since the Intune Service Release 2303 it is now possible to distribute configurations using Linux Bash Script Deployment with Intune. Better too late than not at all, I have dealt with this issue. With the help of the Bash programming language (like PowerShell / Windows), manipulations can made to the...

Most Used Powershell Modules in 2023 as a Cloud Engineer

2. March 2023

Introduction PowerShell is a powerful scripting language that has become a popular choice for cloud engineers due to its ability to automate tasks and manage cloud infrastructure. PowerShell modules are collections of pre-built commands that can be easily used to automate common tasks, making the life of a cloud engineer...

Copy Program Folder to all devices using Microsoft Intune

1. March 2023

Introduction Organizations are incorporating new technologies to improve productivity in today’s world of digital transformation. One such innovation is Microsoft’s cloud-based Intune solution for managing PCs and mobile devices. Using a single console, Intune enables IT administrators to manage and secure devices, apps, and data. In this article, we’ll go...

Intune and Defender 365 – Google Chrome Hardening

13. February 2023

Google Chrome Hardening Guide In order to protect it from potential security risks like malware or unauthorized access to sensitive data, Google Chrome must be hardened. One way to improve the security of the software is to disable (BlockThirdPartyCookies, PasswordManagerEnabled and BackgroundModeEnabled) settings via the registry. We did this already...

Intune and Defender 365 – Adobe Acrobat Reader Hardening

7. February 2023

Adobe Acrobat Reader Hardening Guide In order to protect it from potential security risks like malware or unauthorized access to sensitive data, Adobe Acrobat Reader DC must be hardened. One way to improve the security of the software is to disable JavaScript and Flash settings via the registry. Thus, it...

Best Visual Studio Code Extensions for Azure [2023]

1. February 2023

The Best Visual Studio Code Extensions for Azure in 2023 A simple code editor that works well for creating applications in any programming language is called Visual Studio Code (VS Code). You can modify its behavior by installing extensions, and it is quick, frequently updated, and entirely free. Many extensions...

Enable .NET Framework 3.5 using Intune Proactive Remediation

17. January 2023

Why use .NET Framework 3.5 in 2023? The .NET Framework 3.5 was released in 2007 and is a highly stable and feature-rich platform for developing applications. While it may not have all the latest features of the newer versions of the framework, it is still widely supported and can be...

AlwaysOnVPN – Change Hostfile via Intune Script Deployment

29. December 2022

What is AlwaysOnVPN with Azure Azure Always On VPN is a feature of Microsoft Azure that allows organizations to securely connect their on-premises networks to Azure and access Azure resources from anywhere. It provides a secure, persistent connection between the on-premises network and Azure, allowing users to access resources on...

Intune – Disable “FastBoot” via Proactive Remmediation

29. December 2022

What is Intune Proactive Remediation? Intune Proactive Remediations is a feature of Microsoft Intune that allows you to automatically fix security issues and configuration errors on managed devices. It can be used to help ensure that devices are compliant with your organization’s security policies and are configured correctly. To use...

Load More

End of Content.

© 2023 Copyright