Author: Frank

With Microsoft Intune you can do great things. You can enroll all kind of mobile devices to enforce MDM policies, push applications and even configure managed mobile applicaties like the Microsoft Office applications. You can add an additional security layer to these managed applications by applying an additional access pincode and encrypt the data within […]
This year Google will stop with the support of Android Device Admin API’s with the release of Android 10. This means that the traditional way to manage Android devices is no longer possible with new Android 10 devices or older Android devices that are upgrading to Android 10 (or higher). Android Enterprise is the new […]
Earlier I wrote about how to configure Android Enterprise – Work Profile. This Android Enterprise mode is designed for personal-owned mobile devices. For corporate-owned devies there are two Android Enterprise modes, one for dedicated devices and one for fully managed user devices. In this blog I will show you how to configure Android Enterprise – […]
n my previous blog I talked about how to configure Android Enterprise – Corporate-owned dedicated devices mode with Microsoft Intune. The end result was a device on which the end user cannot do much more than open the published applications, and if it concerns a phone, make phone calls and send text messages. If this […]
Recently a few different customers told me they have plans to replace their expensive and hard to manage thin clients with cheaper Windows 10 fat-clients. And I think it’s a good move because you can easily configure Windows 10 in Kiosk mode via Microsoft Intune (by the time of writing this blog still in preview). […]
If you as an IT admin are using Microsoft Intune for a while, the chance is quite big that you will see devices that are not checked in for a very long time. Often these are devices that are no longer in use or whose device management has been manually removed. By default Microsoft Intune […]
Configuring ASA (Alternate Service Account) for Kerberos authentication on all of the CAS servers We will setup ASA (Alternate Service Account) for Kerberos authentication on all CAS servers in kkishoreblog.com resource forest. By default, clients that attempt to negotiate authentication will fail Kerberos authentication when a CAS array is configured thus falling back to NTLM. […]
Occasionally there is a need to patch an ESXi host without using Update Manager. It may be that Update Manager isn’t installed, or that there are network restrictions in place or that the host is standalone and not connected to vCenter. I recently had to patch such a host, so thought I’d run through the […]
Archives