Author: Driek Desmet
-
Unlocking DUDE: A Guide to Dynamic User and Device Enumeration
DUDE (Dynamic User and Device Enumeration) is a powerful tool for IT administrators to automate the process of retrieving and managing user and device data from Azure AD. Leveraging Microsoft Graph API and PowerShell, DUDE streamlines security monitoring, compliance reporting, and device management. This guide covers its architecture, setup, common use cases, and real-world applications…
-
Secure Your Intune Environment with Multi-Admin Approval: Everything You Need to Know
Multi-Admin Approval (MAA) is a security feature introduced in March 2023 in Microsoft Intune, enhancing security by requiring multiple admin approvals for high-risk actions. This powerful tool helps prevent unauthorised changes, reduces risks, and supports compliance. In this guide, we’ll explore how MAA works, its benefits, required licences, and provide a step-by-step tutorial on setting…
-
Entra ID Conditional Access Baseline
Every spring, as fresh interns arrive, they’re tasked with creating a Conditional Access baseline. While the concept may seem simple, these young minds continually surprise with innovative approaches to security, reminding us that building a robust foundation is an ever-evolving process.
-
Disable Firewall and Network Protection Notifications with Microsoft Intune
Tired of constant firewall and network protection notifications cluttering your Windows 10 workstations? Learn how to easily disable these notifications using Microsoft Intune without turning off the firewall itself. This guide walks you through creating a custom device configuration policy with Configuration Service Provider (CSP) settings, allowing you to silence notifications while keeping your devices…
-
How to Declutter Endpoints by Deleting Stale User Profiles Using Intune
Managing shared or newly built Windows devices can be challenging, especially when old user profiles accumulate and pose security risks. With Microsoft Intune, you can easily declutter your endpoints by automatically deleting stale profiles. This guide walks you through setting up a configuration profile to remove profiles that have been inactive for 60 days, ensuring…
-
Microsoft Announces Enhanced Data Protection in Copilot for Enterprises
Next month, Microsoft is rolling out significant updates to its free Copilot service for users with a Microsoft Entra account. These updates will introduce Enterprise Data Protection (EDP) at no additional cost, extending robust security, privacy, and compliance measures to Copilot’s prompts and responses. Additionally, users will benefit from a new, simplified, ad-free interface tailored…
-
Understanding the Differences Between Intune Update Rings and Windows Autopatch
Managing Windows updates can be challenging, but choosing the right tool is crucial. This post explores the differences between Intune Update Rings and Intune Windows Autopatch, two powerful Microsoft solutions that cater to different IT management needs. Discover which option offers the best balance of control and automation for your organisation.
-
Simplify Device Compliance with Config Refresh: Essential for Endpoint Management
Discover how Microsoft’s new Config Refresh feature simplifies device compliance for systems and cloud engineers. This powerful MDM tool ensures consistent and secure configurations across your organisation, automatically correcting any deviations to maintain alignment with corporate policies. Integrating seamlessly with Microsoft Intune, Config Refresh is essential for effective endpoint management and reducing IT workload
-
Mastering NIS 2 Compliance with Microsoft Purview Compliance Manager
Mastering NIS 2 Compliance with Microsoft Purview Compliance Manager Navigating the complex requirements of NIS 2 compliance is crucial for CISOs. Microsoft Purview Compliance Manager offers a powerful tool to streamline and automate compliance within Microsoft 365. This guide explores how to use the platform to assess data protection risks, implement necessary controls, and stay…
-
Enhanced Cybersecurity: Leveraging Microsoft Defender for Endpoint’s New RDP Data Layer
In the constantly evolving landscape of cybersecurity, staying one step ahead of potential threats is an ongoing challenge for organisations. To address this, Microsoft has taken a significant step forward with its recent update to Microsoft Defender for Endpoint, focusing on Remote Desktop Protocol (RDP) sessions—a common entry point for attackers A New Layer of…