Microsoft Graph PowerShell offers a powerful way to manage and handle administrative tasks for Microsoft 365 and Azure AD through the command line. However, just as with any powerful tool, ensuring security is paramount. This guide delves into the security considerations when using Microsoft Graph PowerShell and presents actionable steps […]
Blog
Working extensively with various Intune tenants often involves handling multiple test devices or virtual machines (VMs) for evaluation purposes. However, occasionally a test device might be forgotten in a client tenant after testing, leading to potential complications. While it’s easy to rebuild a test VM, dealing with a physical device […]
Microsoft Intune is back with its August (2308) service release, bringing forth a host of exciting capabilities that promise to revolutionize device management and security. In this edition, Intune introduces features designed to bolster frontline worker support, provide invaluable insights for smoother administration, and ensure stronger security for Samsung Galaxy […]
In today’s digitized landscape, where security threats loom large, it’s paramount to be proactive in safeguarding your system. While the versatility of USB ports and other removable storage devices is undeniable, they can also serve as gateways for potential security breaches. To fortify your system against malicious software infiltrations, it’s […]
In the ever-evolving realm of digital threats, organizations face an increasingly complex landscape of security challenges. To effectively counter these risks, robust endpoint security solutions have become a necessity. Acknowledging this need, Microsoft is consistently working to enhance its security offerings. A notable stride in this direction is the introduction […]
In an effort to enhance security measures and streamline processes, Microsoft Intune is set to introduce modifications to the way BitLocker resets are handled for re-used Windows Autopilot devices. These changes are expected to come into effect with the September (2309) service release, aiming to improve the overall security posture […]
In today’s interconnected world, data sharing is a fundamental aspect of modern computing. One of the protocols that facilitates this exchange is the Server Message Block (SMB), used predominantly in Windows environments. While SMB offers convenient file and printer sharing capabilities, it’s essential to delve into one of its potential […]
I have been working on this for while but I am truly happy to announce that I have released a new book. PowerShell for Beginners. In our day and age, working as an IT Pro or even a developer, PowerShell is not a subject that can be missed. I encourage […]
If you have configured specific BitLocker policies in your tenant to silently enable BitLocker and have started enrolling devices, you might encounter an issue related to “escrow/backup.” In some cases, the device may fail to back up the BitLocker Drive Encryption recovery information to your Azure AD. This failure is […]
End-to-end encryption of SMB sessions was introduced in version 3 of the Server Message Block protocol (SMBv3). Windows allows you to configure encryption for all shares or just specific shares. One disadvantage is that the communication will only be encrypted if both parties are running Windows 8 or Windows Server […]
A network adapter is a piece of hardware that connects a computer to a network. A laptop, for example, typically has two network adapters, one for the Ethernet connection and one for the wireless connection. A network adapter, like any other hardware component of a computer, has its own representation […]
A Trusted Platform Module (TPM) chip is a specialized hardware component that provides security-related functions and serves as a secure root of trust for a computing system. It is a microcontroller that is integrated into a computer’s motherboard or added as a discrete component. TPM chips are designed to enhance […]