Using PowerShell to create Windows 10 Customer Device Policy from the output of Endpoint Manager Group Policy Analytics

In 2020 Microsoft released the Endpoint Manager Group Policy Analytics (still in Preview). This can be very useful to determine your level of modern management support. At this point Group Policy analytics only provides you with the MDM Supported values in CSP mappings and do not provide any further options to create the policies. As … Continue reading Using PowerShell to create Windows 10 Customer Device Policy from the output of Endpoint Manager Group Policy Analytics

Setup Apple Business Manager for automatic user provisioning

In this blog we will look at the steps required to setup automatic user provisioning. You can refer to this blog on the steps required to setup Apple Business Manager: Setup Apple Business Manager in Intune – Azure Cloud & AI Domain Blog (azurecloudai.blog) Prerequisites Before we get started we need to make sure we … Continue reading Setup Apple Business Manager for automatic user provisioning

Setup Apple Business Manager in Intune

In this blog we will look at how to enroll and configure Apple Business Manager in Intune to manage your corporate owned devices and allow for bulk enrollment. Note. Apple Business Manager is only available in selected countries, please verify that your country is available for enrollment into this program. Availability of Apple programs and … Continue reading Setup Apple Business Manager in Intune

Set up iOS/iPadOS device enrollment with Apple Configurator

Scenario Setting up device enrollment with Apple Configurator, organizations can ensure that their company owned devices can be managed with additional features (Supervised Mode) and will also avoid activation lock of these devices when reallocated. What is Supervised mode? Apple iOS/iPadOS supervised mode gives administrators more options when managing Apple devices, making it useful for … Continue reading Set up iOS/iPadOS device enrollment with Apple Configurator

Configuration Manager – Getting Lenovo Model Information

Using the Model name for devices can be useful when we need to download drivers and create WMI query for our Driver Packs in the Task Sequence. Most manufacturers populate the Model field with the relevant model of the device, but in the case of Lenovo they use a different model number system as such … Continue reading Configuration Manager – Getting Lenovo Model Information

Setting up an Android Emulator for testing Intune features on Apple macOS

Overview In September 2020 Vikash Sivanath wrote a blog on Setting up an Android Emulator for testing Intune features that focused on how to get it setup on a Windows platform. In this blog we will look at setting it up on Apple macOS. Installation Download the Android Studio software from Android’s developer site by … Continue reading Setting up an Android Emulator for testing Intune features on Apple macOS

Configuration Manager Report on Custom Registry Key

The Issue Recently I was at a customer that had a very specific requirement. They deploy Windows 10 via various methods and each method they use custom registry entries to identify the image details. The customer was looking for a way to report on these entries. The image details are identified as follow: 10.1803.1.2 where … Continue reading Configuration Manager Report on Custom Registry Key

MDT Image Create and Capture Fails on Hyper-V Gen2 VM

Many organizations utilize Microsoft Deployment Toolkit (MDT) as an Image Factory to create a baseline image containing all standard applications in a single image to be imported and used for Operating System Deployments via systems like Configuration Manager. Virtual Machines are used to capture the image to ensure it is as clean as possible. A problems … Continue reading MDT Image Create and Capture Fails on Hyper-V Gen2 VM

AppLocker – Part 3

Introduction:In the previous blog we looked at the AppLocker Rules, Rule Conditions and how to enforce them. In this blog we will look at AppLocker in audit mode. By using the Audit only enforcement setting, you can ensure that the AppLocker rules are properly configured for your organization. When AppLocker policy enforcement is set to … Continue reading AppLocker – Part 3