Uncategorized

Planning for Intune Maintenance Windows

If you are managing Intune or implementing Intune for clients, there will be a maintenance window around a month from now.

How does this affect me?

This downtime will impact Intune on Azure, M365 Device management admin center, and Intune for Education. During this downtime, you’ll be able to login to these portals, but you will not be able to make any admin changes. We recommend not logging in to Intune during downtime, since data and reports may not be accurately displayed. Services, for example, device check in, enrollment and app installation will not be available in the console. End users will not be able to access the Company Portal or enroll their device during this time. You shouldn’t plan to make any updates or changes during this maintenance window.

If you have any firewall rules configured, they’ll need to be altered to include the new IP address, prior to the downtime. Click Additional Information for more details on Network endpoints for Intune. You will find additional IP addresses listed under the domain “*.manage.microsoft.com”, which will need to be included in your firewall rules.

Uncategorized

Document Everything in SCCM

So you need to document your customers environment and there is only four hours left in the project. Good news run this script and you get it all.

Head over to GitHub for the script and requirements: https://github.com/paulwetter/DocumentConfigMgrCB

For a summary information of each component run: DocumentCMCB.ps1

For detailed information on the SCCM environment run (huge report!): DocumentCMCB.ps1 -ListAllInformation

Now your have three hours and fifty five minutes left to format the Word document.

Thanks to Techit for showing me this.

Intune, Microsoft

Microsoft Intune introduces MDM Security Baselines for Windows 10

Microsoft have introduced security baselines for Windows 10 devices enrolled into Intune, currently in preview.

Developing Intune security policies are important for the security of devices in a corporate environment, however creating policies that protect from the widest range of security threats possible can be a difficult challenge – with realising new threats and updating policies even more so.

Fortunately, with the introduction of the new security baseslnes features, administrators are now able to review, customise and deploy Microsoft’s recommended security baseline policies within the Intune portal. The recommendations from Microsoft are kept up to date on an on-going basis by Microsoft’s security teams and the service is able to compare your existing policies or previously deployed baselines with Microsoft’s latest recommendations, providing any feedback on what should be changed.

The Microsoft documentation for security baselines can be found here: https://docs.microsoft.com/en-gb/intune/security-baselines

Microsoft, Office 365, Windows 10

Brad Anderson letting you know it is OK to upgrade/update to Windows 10

discover the benefits of Windows 10 and Office 365, major changes and considerations versus previous deployments and best practices to ensure a smooth transition to Windows 10 and Office 365 ProPlus.

Brad Anderson outlines what has changed and go on a tour of the Desktop Deployment Wheel. This will guide you through the recommended steps for your shift to Windows 10 and Office 365 ProPlus, detailing how to leverage your existing tools and processes while adopting modern management technology and approaches along the way.

Microsoft 365, Training & Workshop

Microsoft Modern Workplace Technical Day

Innovate like never before with Microsoft 365! From home to business, from desktop to web and the devices in between, Microsoft 365 empowers your employees with intelligent and secure tools to get work done.

We’re inviting you to experience Microsoft 365’s potential in person with a full-day Modern Workplace (Microsoft 365) Technical Day.

Join us to understand what products are available to you now, as well as understanding new products which can be introduced seamlessly with existing tools and infrastructure.  

The following topics will be covered:

  • Microsoft Teams governance, compliance and best practices
  • Automate O365 Group & Teams provisioning: SharePoint, Azure Functions, PowerApps and Flow in actions
  • Teams as a platform
  • Data Governance, Privacy and Compliance in Microsoft 365
  • Microsoft Security solutions capabilities, tips & tricks how to quickly increase cyber resilience

Cliftons Auckland
September 24, 2019 9:00AM-4:30PM

To register go here: https://www.microsoftevents.com/profile/form/index.cfm?PKformID=0x73405370001

Azure, MFA, Office 365

Office 365 MFA verses Azure Active Directory MFA

Great article by David McWee talking about the real world decision between O365 MFA vs Azure AD MFA. Deficiently worth a read:

https://davidmcwee.com/2018/12/04/o365-mfa-vs-azure-ad-mfa/

Additionally here is a list of the features that are available in the various versions of Office 365 and Azure Multi-Factor Authentication:

https://docs.microsoft.com/en-nz/azure/active-directory/authentication/concept-mfa-licensing#feature-comparison-of-versions

Uncategorized

Windows Analytics in Azure – Where has my Commercial ID gone?

With Microsoft moving from Windows Analytics from OMS to Azure, it has been a bit difficult to find that Commerical ID. No worries, just give this a go:

  1. Go to the Azure Portal and search for Log analytics
  2. Click on solutions
  3. Then go into anyone of the installed analytics features
  4. Click on Settings and the ID is displayed

Security, Security Updates, Windows 7, Windows Server 2008 R2

Are you still Using Windows 7? Microsoft’s Next Update Is Critical

If you want to continue receiving Windows updates, then the next Windows 7 and Windows Server 2008 update is critical as it adds support for SHA-2 encryption. Without it, future updates can’t be downloaded.

The date to prepare for is March 12, which is when Microsoft rolls out the Stand Alone update for Windows 7 and Windows Server 2008. Just leave your desktop or laptop turned on and let Windows Update do its things.

After that, you’ll be in a position to receive all remaining updates until next year. It’s also a chance to grab a few extra months to decide on which upgrade path to take. Do you want a new Windows 10 PC, are you considering a switch to Mac, or is Linux a possibility?

Active Directory, Azure

Five steps to securing your identity infrastructure in Azure Active Directory

This link to the Microsoft document will help you get a more secure posture using the capabilities of Azure Active Directory by using a five-step checklist to inoculate your organization against cyber-attacks.

This checklist will help you quickly deploy critical recommended actions to protect your organization immediately by explaining how to:

  • Strengthen your credentials.
  • Reduce your attack surface area.
  • Automate threat response.
  • Increase your awareness of auditing and monitoring.
  • Enable more predictable and complete end-user security with self-help.

https://docs.microsoft.com/en-us/azure/security/azure-ad-secure-steps

Configuration Manager 2012, Windows 10

Windows IT Pros: Save Time Through Automation

As Configuration Manager pro, you have tens of thousands of endpoints to manage and not nearly enough time to do it all. Your challenge is complex, involving multiple teams within your organization. It may also require new staff, contractors, hardware, and infrastructure.

Join us for this webinar where you will learn the tools, technologies and best practices that Fortune 500 organizations use to manage and secure their endpoints at scale. Discover ways to automate countless endpoint management tasks and eliminate costly I.T. infrastructure.

How to Automatically Manage and Secure Windows Endpoints at Scale
Chaz Spahn, Sr. Solutions Architect, Adaptiva
Tuesday, Oct 30th, 2018
9am PDT / 12pm EDT / 6pm CEST

The program will present many of the products, tools, and training you need to:
• Reliably and cost effectively distribute software, including Windows 10, across an enterprise
• Automate endpoint security configuration management to reduce manual troubleshooting time
• Increase visibility, control, and reporting across an enterprise’s endpoints
• Rapidly adapt to changing I.T. priorities and endpoint security conditions

Register URL: http://www2.adaptiva.com/managesecure