MDM user scope vs MAM user scope

MDM user scope vs MAM user scope

In this post I will discuss on the difference between MDM user scope vs MAM user scope. At first the looks quite confusing and sometimes can create conflict for the desired settings we are looking for personal owned devices (BYOD – Bring Your Own Devices) vs Corporate owned device.

(more…)
Configure Device WinHTTP proxy using Group Policy

Configure Device WinHTTP proxy using Group Policy

In this post I will show you how to configure Device WinHTTP proxy using Group policy. Usually organizations have proxy settings which is applied for users and you will be able to see the proxy settings registry value under HKCU registry hive. However, WinHTTP proxy which is also called device proxy or system proxy, works at device level. The services such as Intune, Autopilot and others relies on device proxy so that communication shouldn’t break while getting connected to cloud services.

(more…)
Troubleshoot Hybrid Azure AD Join issues

Troubleshoot Hybrid Azure AD Join issues

In this post I will show you the steps to troubleshoot Hybrid Azure AD Join issues. Before troubleshooting Hybrid Azure AD issues, we need to understand the basic configuration we require. Once we verify the settings are ok, we can further go and troubleshoot the issues.

If you are sure about Hybrid Azure AD-join configuration are ok, then you can directly skip to “Steps to perform for Hybrid Azure AD-join issues

(more…)
How to track Conditional Access Policy change using email alert

How to track Conditional Access Policy change using email alert

In this post I will show you how to track Conditional Access Policy change using email alert as a solution. Conditional Access is one of the most important aspect of Azure where we can use to block / allow certain applications and other settings based upon conditions. However, we also want to make sure that no unauthorized changes are applied to Conditional access policies. Using Log Analytics alert feature we can get the email whenever any changes are applied in the environment.

This will help analysing who made the changes to Conditional Access policy.

(more…)