This is the second guest post from my partner Recast Software.
Imagine reducing 90% of critical security vulnerabilities with a single change to your IT policy. Removing local admin rights can achieve this. IT departments face a constant influx of tickets and issues to manage. Many of these result from a need to elevate permissions, perhaps to update a piece of software or access a resource. The old way of getting around this issue was to give end users local admin permissions on their device. I know many of you are cringing just reading that—so am I. There are many, many reasons not to give end-users local admin permissions. The risks associated with local admin rights greatly outweigh the benefit of fewer tickets from end-users.
Create your own Intune Co Pilot using CoPilot Studio
In the last post I explained how you can build a CoPilot using the Azure OpenAI Studio in this blog post we will do the same with the CoPilot Studio. Here we will also utilize the Azure OpenAI Service. Lets have an quick look into this topic as well:
Read More »Create your own Intune Co Pilot using Azure OpenAi Studio
The simplest approach to deploying a chatbot is to do so without any coding. This is precisely what I aim to demonstrate. Such a chatbot can be tailored to utilize your custom documentation, knowledge articles, or any other resources you wish to integrate. This method simplifies the process, making it accessible even if you’re not well-versed in programming. By leveraging existing documents and knowledge bases, you can create a chatbot that is both informative and aligned with your specific needs and content.
Read More »Reenrol devices without wipe
Enrolled Intune devices occasionally face trust issues due to MDM or Microsoft Azure certificate problems, among other factors. While wiping and re-enrolling is a standard fix, it’s straightforward for regular devices, with minimal data loss thanks to services like OneDrive. However, this process is more complex for specialized field devices, particularly those with custom configurations and vendor-installed software, especially if the vendor not longer exists. Creative strategies are essential in these cases. This blog post delves into an experimental approach to seamlessly bring such devices back under management.
Read More »GPT Remediation creator
Remediations play a pivotal role in effective client management, allowing organizations to proactively identify and resolve end-user issues. Additionally, they serve as a valuable tool for enforcing specific settings or configurations that may not be natively supported in Microsoft Intune. However, the process of crafting these scripts can often be intricate and time-consuming.
Imagine a solution where you can simply describe your desired configurations, and a tool generates the necessary scripts for you. If you find this idea appealing and are keen to explore such a solution, this blog is tailored to meet your exact needs.
Read More »Easy and Effective App Management in Intune
This is the first guest post from my partner Recast Software. Managing an ever-growing array of systems and permissions, SysAdmins often find third-party application patching slipping through the cracks. Despite best efforts to keep Windows updates in check, the other applications on our endpoints too frequently get overlooked.
This is where Application Manager by Recast Software (makers of Right Click Tools) comes into play. With Application Manager you can keep your third-party applications as up to date as possible. This way you can focus on more pressing projects, while resting easier knowing that your endpoints are more secure.
Read More »Deep Dive into Co-Pilots: Understanding Architecture, LLMs, and Advanced Concepts
In this blog post I want to deep dive with you how LLMs and CoPilots work, want to give an explanations into the most important aspects and show you some important architecture aspects and concepts. We will not build an own Copilot but I will share also some reference architectures and a tool I created to answer your question with informations of you own Intune tenant. Let me know if I should create also an second blog post to go with you step by step through the process of implementing an own bot which use your own data and a LLM model to help you in your daily business working with Intune.
Read More »Microsoft Defender for Endpoint: Key Configurations and Best Practices (2/2)
After some weeks here is the second part of my series on Microsoft Defender for Endpoint. In this pert, we delve into essential insights and best practices for Microsoft Defender for Endpoint. I will guide you through important configurations and strategies to enhance your organisations security.
Part 1 (How to enroll device to Microsoft Defender for Endpoint and how does it work)
Read More »The easy way to make data science with Intune
As you know I like everything what is related to data science and Intune. In this blog I will show you a solution how you can get some insights about your Intune environment you did not have bevor.
Read More »Detect new Intune Management Extension Updates
You know there are regular changes and updates on the Intune Management Extension (IME). Sometimes it can be the cause of an issues or it is also interesting to see what was changed. To detect this changes I wrote an script which notifies you in case of an change and will let you know what was changes.
Read More »