Automating Local Admin Rights Removal w/ Privilege Manager

This is the second guest post from my partner Recast Software. 
Imagine reducing 90% of critical security vulnerabilities with a single change to your IT policy. Removing local admin rights can achieve this. IT departments face a constant influx of tickets and issues to manage. Many of these result from a need to elevate permissions, perhaps to update a piece of software or access a resource. The old way of getting around this issue was to give end users local admin permissions on their device. I know many of you are cringing just reading that—so am I. There are many, many reasons not to give end-users local admin permissions. The risks associated with local admin rights greatly outweigh the benefit of fewer tickets from end-users.

Read More »

Create your own Intune Co Pilot using Azure OpenAi Studio

The simplest approach to deploying a chatbot is to do so without any coding. This is precisely what I aim to demonstrate. Such a chatbot can be tailored to utilize your custom documentation, knowledge articles, or any other resources you wish to integrate. This method simplifies the process, making it accessible even if you’re not well-versed in programming. By leveraging existing documents and knowledge bases, you can create a chatbot that is both informative and aligned with your specific needs and content.

Read More »

Reenrol devices without wipe

Enrolled Intune devices occasionally face trust issues due to MDM or Microsoft Azure certificate problems, among other factors. While wiping and re-enrolling is a standard fix, it’s straightforward for regular devices, with minimal data loss thanks to services like OneDrive. However, this process is more complex for specialized field devices, particularly those with custom configurations and vendor-installed software, especially if the vendor not longer exists. Creative strategies are essential in these cases. This blog post delves into an experimental approach to seamlessly bring such devices back under management.

Read More »

GPT Remediation creator

Remediations play a pivotal role in effective client management, allowing organizations to proactively identify and resolve end-user issues. Additionally, they serve as a valuable tool for enforcing specific settings or configurations that may not be natively supported in Microsoft Intune. However, the process of crafting these scripts can often be intricate and time-consuming.

Imagine a solution where you can simply describe your desired configurations, and a tool generates the necessary scripts for you. If you find this idea appealing and are keen to explore such a solution, this blog is tailored to meet your exact needs.

Read More »

Easy and Effective App Management in Intune

This is the first guest post from my partner Recast Software. Managing an ever-growing array of systems and permissions, SysAdmins often find third-party application patching slipping through the cracks. Despite best efforts to keep Windows updates in check, the other applications on our endpoints too frequently get overlooked.

This is where Application Manager by Recast Software (makers of Right Click Tools) comes into play. With Application Manager you can keep your third-party applications as up to date as possible. This way you can focus on more pressing projects, while resting easier knowing that your endpoints are more secure.

Read More »

Deep Dive into Co-Pilots: Understanding Architecture, LLMs, and Advanced Concepts

In this blog post I want to deep dive with you how LLMs and CoPilots work, want to give an explanations into the most important aspects and show you some important architecture aspects and concepts. We will not build an own Copilot but I will share also some reference architectures and a tool I created to answer your question with informations of you own Intune tenant. Let me know if I should create also an second blog post to go with you step by step through the process of implementing an own bot which use your own data and a LLM model to help you in your daily business working with Intune.

Read More »

Microsoft Defender for Endpoint: Key Configurations and Best Practices (2/2)

After some weeks here is the second part of my series on Microsoft Defender for Endpoint. In this pert, we delve into essential insights and best practices for Microsoft Defender for Endpoint. I will guide you through important configurations and strategies to enhance your organisations security.

Part 1 (How to enroll device to Microsoft Defender for Endpoint and how does it work)

Read More »