1 min read
Office 365 – You can now launch simulated attacks targeting your end-users
As working remotely is more predominant, ensuring your end-users are working securely is more important than ever.
Read More1 min read
As working remotely is more predominant, ensuring your end-users are working securely is more important than ever.
Read More1 min read
If you are using System Center Configuration Manager Current Branch (SCCM Current Branch) version 2006 in a co-management configuration with...
This is a breaking change introduced by Android 11 when a device is being enroll as Android device administrator.
1 min read
As you know, you can manage Windows Defender settings by creating device configuration profiles using Intune/Endpoint Configuration Manager,...
1 min read
As you know, it is recommended to enable the virtual machine boot diagnostics to help gathering information when troubleshooting virtual machine boot...
1 min read
For years, IT administrators have been using group policy objects (GPO) – and still continue today – to manage/configure devices, both clients and...
As you know, Intune/Endpoint Configuration Manager allows your administrators to publish applications from the various app stores (Google Play, Apple...
As you know, when setting up a Teams meeting you can define who can be automatically admitted to join the meeting, defined by your Teams...
As you know, you can delegate permissions to allow certain administrative or management tasks using RBAC (Role Based Access Control) on...
1 min read
As you know, you can invite external users (known as guest) to your organization, leading to the creation of a guest account in your Azure AD.