In this post I will show you how to configure Windows Update for Business reports which can help monitoring and reporting for Updates deployment using Quality updates, features updates and also can be used delivery optimization status for devices.(more…)
In this post I will be showing you how to add devices to Azure AD group using bulk operations feature. If the task is to add lots of devices to Azure AD group, this process will help you achieve the results.(more…)
In this post I will be discussing on how to configure Azure Active Directory account to go passwordless using FIDO2 security key. I recently received AllinPass FIDO2 Plus security key to explore the feature and to provide my views on it. I will be providing my inputs on the usage, benefits and the reason to use FIDO2 security keys. But before that lets understand the basics.(more…)
In this post I will discuss on the difference between MDM user scope vs MAM user scope. At first the looks quite confusing and sometimes can create conflict for the desired settings we are looking for personal owned devices (BYOD – Bring Your Own Devices) vs Corporate owned device.(more…)
In this post I will show you the steps to troubleshoot Hybrid Azure AD Join issues. Before troubleshooting Hybrid Azure AD issues, we need to understand the basic configuration we require. Once we verify the settings are ok, we can further go and troubleshoot the issues.
If you are sure about Hybrid Azure AD-join configuration are ok, then you can directly skip to “Steps to perform for Hybrid Azure AD-join issues”(more…)
In this post I will show you how to track Conditional Access Policy change using email alert as a solution. Conditional Access is one of the most important aspect of Azure where we can use to block / allow certain applications and other settings based upon conditions. However, we also want to make sure that no unauthorized changes are applied to Conditional access policies. Using Log Analytics alert feature we can get the email whenever any changes are applied in the environment.
This will help analysing who made the changes to Conditional Access policy.(more…)