GPT Remediation creator

Remediations play a pivotal role in effective client management, allowing organizations to proactively identify and resolve end-user issues. Additionally, they serve as a valuable tool for enforcing specific settings or configurations that may not be natively supported in Microsoft Intune. However, the process of crafting these scripts can often be intricate and time-consuming.

Imagine a solution where you can simply describe your desired configurations, and a tool generates the necessary scripts for you. If you find this idea appealing and are keen to explore such a solution, this blog is tailored to meet your exact needs.

Read More »

Easy and Effective App Management in Intune

This is the first guest post from my partner Recast Software. Managing an ever-growing array of systems and permissions, SysAdmins often find third-party application patching slipping through the cracks. Despite best efforts to keep Windows updates in check, the other applications on our endpoints too frequently get overlooked.

This is where Application Manager by Recast Software (makers of Right Click Tools) comes into play. With Application Manager you can keep your third-party applications as up to date as possible. This way you can focus on more pressing projects, while resting easier knowing that your endpoints are more secure.

Read More »

Deep Dive into Co-Pilots: Understanding Architecture, LLMs, and Advanced Concepts

In this blog post I want to deep dive with you how LLMs and CoPilots work, want to give an explanations into the most important aspects and show you some important architecture aspects and concepts. We will not build an own Copilot but I will share also some reference architectures and a tool I created to answer your question with informations of you own Intune tenant. Let me know if I should create also an second blog post to go with you step by step through the process of implementing an own bot which use your own data and a LLM model to help you in your daily business working with Intune.

Read More »

Microsoft Defender for Endpoint: Key Configurations and Best Practices (2/2)

After some weeks here is the second part of my series on Microsoft Defender for Endpoint. In this pert, we delve into essential insights and best practices for Microsoft Defender for Endpoint. I will guide you through important configurations and strategies to enhance your organisations security.

Part 1 (How to enroll device to Microsoft Defender for Endpoint and how does it work)

Read More »