Practical Endpoint: Restricting Admin Access to an Endpoint
In this episode of Practical Endpoint, we explain two approaches to restricting Admin rights to corporate devices using Intune and Autopilot.
In this episode of Practical Endpoint, we explain two approaches to restricting Admin rights to corporate devices using Intune and Autopilot.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
With the rise of generative AI comes an increased risk of organizational data leakage. This article explores recommendations to secure Microsoft 365 data from unauthorized generative AI applications.
Microsoft recently released a revamped version of LAPS that can store the local admin password in Entra ID to work with cloud-managed endpoints. In this blog, we dive into deploying LAPS and how to use it to further enhance the security of Windows endpoints.
Integrating devices with Intune requires a multifaceted approach to accommodate various organizational needs. In this blog, we review a few strategies for effectively integrating devices with Intune in your organization.
On Season 4, Episode 15 it's a trio of MVPs, as Steve and Paul are joined by UK MVP Jon Jarvis to discuss Intune & the criticality of making sure you onboard devices. And a show wouldn't be complete with an mention of AI! We discuss a new feature that helps you restrict what Copilot can search and use from your SharePoint sites.
In this blog, Jon Jarvis reviews the importance of integrating devices with Intune, and the risks that can arise from poorly managed devices.
Tips and Techniques to Avoid Common Issues In a previous post, I discussed how to leverage the Microsoft Tunnel solution to control access to your Microsoft 365 environment. In this article, I discuss deploying the Microsoft Tunnel VPN gateway in an enterprise environment. Basic Deployment The basic steps to deploy the Microsoft Tunnel VPN gateway […]
When performing an Office 365 Tenant-To-Tenant Migration, the goal should be to migrate everything possible with minimal user disruption, including devices
The OneDrive Sync Client is key to providing users with a reliable way to store files in SharePoint Online and OneDrive for Business. Therefore, it’s important that tenant administrators deploy OneDrive in a way that meets their organization’s requirements. This article explores the administrative options available for deploying and controlling OneDrive Sync Client.
In a frantic rush to enable remote workers at the onset of the pandemic, many organizations were forced to ship devices directly to the user from the supplier without any prior configuration by IT. Administrators must take back control to properly secure and manage these devices. This article will show you how to regain control and prepare for scalable deployments consistent with corporate policy; reviews best practices for long-term management; and gets you thinking about how to protect your organization from this type of unmanaged situation in the future.
With the move from Edge Legacy to Edge Chromium, there are few reasons to use a third-party browser on Windows 10. Despite being the browser of choice for most businesses, Edge, much like OneDrive for Business, needs a bit of configuration to get it right. In this article, Ru explains the different Intune Administrative Templates recommended to make your users’ first run of Edge smooth and appropriate for the enterprise.