Skip to content

Month: Feb 2024

How to Automate Guest Account UserType Updates in Microsoft Entra with PowerShell

Managing guest user accounts in Microsoft Entra (formerly Azure Active Directory) is a critical aspect of maintaining the security and functionality of your organization’s tenant. Guest accounts often require specific permissions that differ from those of regular users, and sometimes, it becomes necessary to elevate these permissions by changing the account type from Guest to…

Leave a Comment

Accessing Threat Intelligence Data from Defender for XDR Portal: A Comprehensive Guide

Accessing Threat Intelligence Data from Defender for XDR Portal: A Comprehensive Guide Navigating the complexities of cybersecurity requires a strategic approach, and key to that strategy is leveraging the right tools and data. Microsoft’s Defender for XDR stands out as a comprehensive solution, offering not just a defense mechanism but also a wealth of threat…

Leave a Comment

Step-by-Step Guide: Enforcing Password History in Intune

Step-by-Step Guide: Enforcing Password History in Intune Keeping your organization’s data secure is paramount in today’s digital age. One key aspect of this is ensuring that passwords are not reused too quickly, which can be a significant vulnerability. In this guide, we’ll walk you through the steps to enforce a password history of 24 or…

Leave a Comment

SharePoint: Microsoft 365 Archive for Sites – Revolutionizing Data Management

SharePoint: Microsoft 365 Archive for Sites – Revolutionizing Data Management In the digital era, where data grows exponentially, organizations face the challenge of managing inactive data without incurring prohibitive costs or compromising on compliance and security. Microsoft’s innovative solution, Microsoft 365 Archive, now in preview, offers a paradigm shift in managing SharePoint Online sites, aligning…

Leave a Comment

How to Deploy a PowerShell Script via Intune to Remove AnyDesk from Devices

How to Deploy a PowerShell Script via Intune to Remove AnyDesk from Devices In light of recent security concerns, it’s become increasingly important for IT administrators to be able to quickly respond and mitigate potential threats. One such measure could involve the removal of potentially compromised software, like AnyDesk, from all managed devices. This blog…

Leave a Comment