Author: Frank

You now have the ability to sign into your Azure AD account without using a password. With the Authenticator app you can approve the sign in by selecting the correct number which is displayed on the login screen. To set this up you need to enable this at the tenant level first. To do this […]
If you are using multiple conditional access policies in your Azure AD environment things can start to get complex when trying to work out which policies will be applied due to the many variables and granular control. This is where the “What if” feature is awesome. You can simulate the impact of a CA policy […]
You may have noticed when creating an app protection policy for iOS there are now 5 options when deciding how org data can be shared with other apps. As some of these settings are relatively new I decided to do a post on each setting and what the experience would be like for the end […]
One of the latest changes to Intune is the ability to now deploy a configuration profile with iOS update deferral settings. Microsoft are now suggesting that you move from configuring these settings in Update policies to using a configuration profile. One of the main drivers for this is that you can now defer an iOS update […]
In the previous two posts, we looked at two capabilities of Azure Information Protection (AIP) P1, which is one of the many subscriptions bundled into Microsoft 365 Business: Email encryption & customization Labels for classifying messages and documents Recent announcements have shifted the sands a bit here with so-called “Unified labeling“–which refers to a separate data classification […]
In this blog we cover how you can automatically load Power BI activity logs (or any other Office365 activity) into a database for detailed analysis across all workspaces in your tenant. The advantage in comparison to using the inbuilt Office365 log analysis is that you are not limited by log expiration periods (typically only the […]
Use the following steps to install the base client MSI package using Active Directory Group Policies. 1. Create a folder to hold the MSI package to be pushed out. Share the folder with the appropriate permissions to allow the users and computers to read and run these files. 2. From the Software Installation Package, navigate to […]
After an outage or maintenance to the Exchange 2010 or Exchange 2013, or Exchange 2016Mailbox servers in a Database Availability Group you may find that the mailbox databases are no longer balanced across all of the DAG members. For example after applying updates to DAG members you may see that all of the mailbox databases are active on a single DAG member. […]
Archives