Articles about Microsoft Intune from Practical365.com.
Latest Articles
Microsoft recently released a revamped version of LAPS that can store the local admin password in Entra ID to work with cloud-managed endpoints. In this blog, we dive into deploying LAPS and how to use it to further enhance the security of Windows endpoints.
Integrating devices with Intune requires a multifaceted approach to accommodate various organizational needs. In this blog, we review a few strategies for effectively integrating devices with Intune in your organization.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
On Season 4, Episode 15 it's a trio of MVPs, as Steve and Paul are joined by UK MVP Jon Jarvis to discuss Intune & the criticality of making sure you onboard devices. And a show wouldn't be complete with an mention of AI! We discuss a new feature that helps you restrict what Copilot can search and use from your SharePoint sites.
In this blog, Jon Jarvis reviews the importance of integrating devices with Intune, and the risks that can arise from poorly managed devices.
Tips and Techniques to Avoid Common Issues In a previous post, I discussed how to leverage the Microsoft Tunnel solution to control access to your Microsoft 365 environment. In this article, I discuss deploying the Microsoft Tunnel VPN gateway in an enterprise environment. Basic Deployment The basic steps to deploy the Microsoft Tunnel VPN gateway […]
When performing an Office 365 Tenant-To-Tenant Migration, the goal should be to migrate everything possible with minimal user disruption, including devices
Organizations used to use Intune MDM to manage apps, but with the increase in devices and apps, Intune MAM is the more appropriate vehicle. This article will give an overview of Intune app protection policy within MAM with specific policies I found particularly useful for protecting corporate data.
Giving Intune Role Administrator permissions to all administrators is never the right answer; however, it is important for organizations to correctly set up Intune RBAC roles to ensure that administrators have the permissions to do their daily tasks without interfering or having the ability to tamper with devices that do not concern them.
One of the most important requirements for organizations that wish to use Intune is the security baseline of the device. There are differences between the guidance provided by NCSC, CIS, and Microsoft’s pre-configured security baselines for Intune. This article explains the guidance from each organization, while providing a gap analysis between the baselines.
With an increasing number of companies moving to Intune for endpoint management, more applications must be deployed via Intune to ensure users can access the applications they need to perform job functions. This article walks you through the steps to deploy a legacy application and guides you through converting an .exe installer into an import-ready format for Intune.
The reality is, remote employees and working situations are here to stay. Unfortunately, many organizations have regressed in terms of endpoint security, partly due to the pandemic as well as the subsequent rush to implement remote work solutions. To help make sense of the many technologies out there and determine the best approach for your organization, this article explores different options from the traditional Active Directory domain membership with group policy management, to co-management with Configuration Manager and Microsoft Intune.