Tips and Techniques to Avoid Common Issues In a previous post, I discussed how to leverage the Microsoft Tunnel solution to control access to your Microsoft 365 environment. In this article, I discuss deploying the Microsoft Tunnel VPN gateway in an enterprise environment. Basic Deployment The basic steps to deploy the Microsoft Tunnel VPN gateway […]
Articles about Microsoft Intune from Practical365.com.
When performing an Office 365 Tenant-To-Tenant Migration, the goal should be to migrate everything possible with minimal user disruption, including devices
Organizations used to use Intune MDM to manage apps, but with the increase in devices and apps, Intune MAM is the more appropriate vehicle. This article will give an overview of Intune app protection policy within MAM with specific policies I found particularly useful for protecting corporate data.
Giving Intune Role Administrator permissions to all administrators is never the right answer; however, it is important for organizations to correctly set up Intune RBAC roles to ensure that administrators have the permissions to do their daily tasks without interfering or having the ability to tamper with devices that do not concern them.
One of the most important requirements for organizations that wish to use Intune is the security baseline of the device. There are differences between the guidance provided by NCSC, CIS, and Microsoft’s pre-configured security baselines for Intune. This article explains the guidance from each organization, while providing a gap analysis between the baselines.
With an increasing number of companies moving to Intune for endpoint management, more applications must be deployed via Intune to ensure users can access the applications they need to perform job functions. This article walks you through the steps to deploy a legacy application and guides you through converting an .exe installer into an import-ready format for Intune.
The reality is, remote employees and working situations are here to stay. Unfortunately, many organizations have regressed in terms of endpoint security, partly due to the pandemic as well as the subsequent rush to implement remote work solutions. To help make sense of the many technologies out there and determine the best approach for your organization, this article explores different options from the traditional Active Directory domain membership with group policy management, to co-management with Configuration Manager and Microsoft Intune.
TEC 2021, The Experts Conference, takes place as a virtual event on September 1-2. In this article, Tony selects his favorite sessions from the event agenda. This isn't to say that the other sessions are no good. Everyone's got their own favorite topics and there are many other TEC 2021 sessions covering other topics which will make others very happy.
In a frantic rush to enable remote workers at the onset of the pandemic, many organizations were forced to ship devices directly to the user from the supplier without any prior configuration by IT. Administrators must take back control to properly secure and manage these devices. This article will show you how to regain control and prepare for scalable deployments consistent with corporate policy; reviews best practices for long-term management; and gets you thinking about how to protect your organization from this type of unmanaged situation in the future.