How to enroll windows devices to Intune – multiple methods
In this post I am going to discuss on how enroll Windows devices to Intune as there are several different ways and methods to do that.
(more…)In this post I am going to discuss on how enroll Windows devices to Intune as there are several different ways and methods to do that.
(more…)In this post I will be showing you how to add devices to Azure AD group using bulk operations feature. If the task is to add lots of devices to Azure AD group, this process will help you achieve the results.
(more…)
In this post I will discuss on the difference between MDM user scope vs MAM user scope. At first the looks quite confusing and sometimes can create conflict for the desired settings we are looking for personal owned devices (BYOD – Bring Your Own Devices) vs Corporate owned device.
(more…)
In this post I will show you how to configure Device WinHTTP proxy using Group policy. Usually organizations have proxy settings which is applied for users and you will be able to see the proxy settings registry value under HKCU registry hive. However, WinHTTP proxy which is also called device proxy or system proxy, works at device level. The services such as Intune, Autopilot and others relies on device proxy so that communication shouldn’t break while getting connected to cloud services.
(more…)
In this post I will show you the steps to troubleshoot Hybrid Azure AD Join issues. Before troubleshooting Hybrid Azure AD issues, we need to understand the basic configuration we require. Once we verify the settings are ok, we can further go and troubleshoot the issues.
If you are sure about Hybrid Azure AD-join configuration are ok, then you can directly skip to “Steps to perform for Hybrid Azure AD-join issues”
(more…)
In this post I will show you how to track Conditional Access Policy change using email alert as a solution. Conditional Access is one of the most important aspect of Azure where we can use to block / allow certain applications and other settings based upon conditions. However, we also want to make sure that no unauthorized changes are applied to Conditional access policies. Using Log Analytics alert feature we can get the email whenever any changes are applied in the environment.
This will help analysing who made the changes to Conditional Access policy.
(more…)