Microsoft’s annual tech event, Microsoft Ignite 2024, was held in Chicago last week. The on-site event includes informative sessions, product demos,…
Enhanced Phishing Protection is a device configuration for Microsoft Defender that many companies overlook. Arguably, it’s not the most important one,…
Today, it’s time for another blog post in the unmanaged devices series. We’ll look at a newly introduced feature called in-browser…
On a snowy morning, while snowboarding down the slopes of Sölden (Austria), I received something memorable. I stepped onto a Gondola…
Mobile Application Management (MAM) for Android and iOS has been part of Microsoft Intune for many years now. MAM allows us…
Today, we will discuss nothing new, but it’s still a topic that remains as relevant and important as ever. If you…
Initially, Microsoft introduced the cross-tenant access settings in Microsoft Entra simultaneously with the shared channel feature in Microsoft Teams. Setting up…
Welcome to my blog series on the topic of unmanaged devices! More and more users are working from unmanaged devices than…
Many times, I’ve seen companies actively managing personal devices in Microsoft Intune, sometimes intentionally, but most of the time, accidentally without…
Organizations with access to Microsoft Intune will almost always choose to manage their corporately owned devices using Mobile Device Management. However,…