How to deploy msix package using Intune

In this post I will be discussing on how to deploy the msix package using Intune. To deploy msix package, we need to have Code Signing Certificate created and deployed. We also need to have msix file created. We will be then deploying the certificate using Intune and then deploying the actual msix package.

(more…)
How to create MSIX package using MSIX Packaging Tool

How to create MSIX package using MSIX Packaging Tool

In this post I will be discussing on how to create MSIX package using MSIX Packaging Tool. There are couple of requirements to create MSIX package which includes creating Code signing Certificate, downloading and creating package using MSIX packaging tool and to sign the application with Code signing certificate.

(more…)

Verify Conditional Access Policies using Report Only mode

In this post I will be covering the toping on how to verify Conditional Access Policies using Report Only Mode. It is always recommended to verify CA Policies before applying it in production. Report only mode comes as a handy tool to simulate the behaviour to check and see what could have happened if policy would have applied.

(more…)

How to ingest Google Chrome policies using Intune

In this post I will be discussing on how to ingest Google Chrome policies using Intune. We can also say how to manage chrome policies using Intune. To deploy chrome policies, we need to Ingest the Chrome ADMX file into Intune which can be downloaded from Chrome ADMX templates. We will then proceed with creating the Configuration profile to add the ADMX templates there are proceeding with few other OMA-URI settings specific to Chrome settings we desire.

(more…)
Restrict access to Azure Portal from external network using Conditional Access Policy

Restrict access to Azure Portal from external network using Conditional Access Policy

In this post I will cover the topic on how to restrict the access to Azure Portal from external network using Conditional Access Policy. When we say restricting the access from external network – means we are talking about location / IP address range. If organization is having Active Directory installed, they already have Active Directory sites and services with all AD sites specified. These AD Sites (can be called location) will be having list of IP subnets defined for each. Based upon our requirement we can add create the Named Locations through Conditional Access settings and can specify the IP address subnets and can mark them as trusted location.

(more…)