Using WinGet with Intune
In this blog, we explore how IT admins can leverage WinGet, Microsoft’s Windows Package Manager, to streamline application deployment and updates across Intune-managed devices.
In this blog, we explore how IT admins can leverage WinGet, Microsoft’s Windows Package Manager, to streamline application deployment and updates across Intune-managed devices.
In this article, James Yip discusses different ways to leverage Intune to run PowerShell scripts as part of endpoint management, specifically for Windows workstations, to perform custom administrative tasks.
Minimizing disruption is key to any migration. In this blog, we discuss migrating SharePoint sites and data to SharePoint Online, reviewing common issues, and offering a few different approaches to reduce friction.
In this episode of Practical Endpoint, we explain two approaches to restricting Admin rights to corporate devices using Intune and Autopilot.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
Defender for Endpoint gathers system information to support operation and detection needs. We can then leverage that data to build a custom report to show the deployment status. This blog walks through that process using KQL.
Microsoft recently released a revamped version of LAPS that can store the local admin password in Entra ID to work with cloud-managed endpoints. In this blog, we dive into deploying LAPS and how to use it to further enhance the security of Windows endpoints.
In this blog, James Yip reviews how to use PowerShell to examine details of managed devices and installed apps on endpoints.
In this article, we discuss how to enhance mobile security in MAM, focusing on the Defender for Endpoint functionality and features related to mobile devices, specifically for BYOD scenarios.
Over time, Microsoft 365 tenants often grow and the number of devices and users increases. Instead of adding groups one by one whenever an additional user is added, dynamic groups will simplify your work. In this article, we explain some good reasons to use dynamic groups and some points to keep in mind when using them.
Security is not a one-time thing. We must improve configurations as products evolve and new situations arise. In this blog, James Yip dives into his top five security topics for Microsoft 365 Projects.