Welcome to this weeks newsletter which for a holiday week has a surprising amount of content from this incredible community.
So, let’s begin…
If you missed the AMA on Autopilot last week, here Johan Arwidmark has looked at some of the key questions and answers raised.
Following on from the previous post on device compliance, Jannik Reinhard, this one uses Azure Automation and Cognitive services to alert via Teams if there is a sudden increase in application installation failures.
A second post from Jannik with some updates to the excellent System Tray tool adding some welcome additions (sync, Quick assist and password reset)
Another part-2 post, this time from Shehan Perera looking at the options for providing local admin on AAD devices with the Microsoft built-in options.
Whilst I normally stick to just Intune related posts, this one from Dominiek Verham whilst mostly around Windows 365 has some excellent content around the new Autopatch service
After an update from Microsoft, there has been a change to the old method of triggering an app re-install after 3 failed attempts. Read about it in this post from Rudy Ooms
Rudy’s second post this week is an excellent look at a time-out error you may be seeing in Autopilot and what’s causing it
If you have migrated machines from one tenant to another, have a look at this post from Simon Skotheimsvik to watch for a potential issue with devices in Store for Business
One of my favourites this week, Jasper Bernaers has done an excellent guide on why you should move devices to Intune. I imagine if you’re reading this, you have already made that decision, but this will certainly help convince the execs!
Following the alerting theme from previous weeks, this post from Manish Bangia shows how to use Log Analytics to alert to any changes on a Conditional Access Policy
Next we have four posts from Jitesh Kumar (a busy week!), starting with a guide on sending custom notifications to devices and the experience across platforms
The second post looks at the new reports in Preview to check on the status of autopatch deployments
This in-depth guide runs through configuring and monitoring Security Baselines
If you have deployed Autopatch and want to exclude some devices from it (possibly key machines), this guide has you covered
In a follow-up to last weeks post, Oktay Sari looks at a passwordless experience on Android and iOS devices using the Microsoft Authenticator app. I’d recommend watching the video at the end to see the user experience as well
For those of us with scripted installs, this post from Gannon Novak shows how to create AAD Groups using the Graph module instead of Azure AD module
Gannon’s second post this week uses PowerShell, Logic Apps and many others to grab hardware hashes and send them straight to a teams channel
Browser extensions are a wonderful thing, I’m sure we all have many of them, but we want to manage just what our end users can and can’t add. This post from Joost Gelijsteen shows how to do just that in both Edge and Chrome.
A very useful and thorough post from James Yip looking at why App Protection policies are essential and how to configure them.
This post from Rabia Noureen looks at the new Azure AD review functionality and also explains more around the change to force Security Defaults.
Intune isn’t just for end user devices, now the new server licensing has arrived, you can use Defender for Endpoint and Intune to manage servers Anti-virus, as explained in this post from Florian Salzmann
Risky sign-ins are one thing that everyone should be monitoring, but if you don’t have a SIEM, it can be a time consuming process. Fortunately we have a solution from Søren Andersen using Log Analytics and a Logic App to email a list from the previous 24 hours.
If you do any App Packaging and haven’t looked at PSADT, watch this video from Mattias Melkersen Kalvåg and see how it will make your life so much easier!
We have another tool to help your users be more self-sufficient and hopefully reduce support calls. This one from Christopher Mogis has some excellent features and I would strongly suggest giving it a try.
File Associations can be a real pain, add in different departments using different applications and it can almost feel like a full time job in itself. This post from René Laas will show you how to leverage Sharepoint and Logic Apps to do the heavy lifting for you!
If you are reading this after your summer holidays, or looking forward to starting them, Jonas Bøgvad has some tips on what to check upon your return (as well as clearing that backlog of emails!)
Following on from last weeks post on how to collect Procmon logs from Defender, in this one, Anand P shows how to then analyse them further.
Next we have two posts from Anoop C Nair, the first one digs into the Update Compliance logs and grabs device and patch details using KQL
The second post looks at a current Autopilot issue where users are getting a message about an Invalid Username and Password. It seems to be happening more often, so worth reading about now in case you come across it in your environment
A late addition, a new application has been released by Ugur Koc which will search for a Winget application, grab the files and package it for you
Now onto the Microsoft announcements from this week
First, it’s always worth checking what’s new in the world of Intune
This part is particularly interesting
Some excellent news around hardware replacements, Intune and Autopilot can now cope with motherboard replacements!
New Azure AD Certificate Authentication as well
An overview of what happens when you deploy machines to Autopatch:
And to finish off, probably the most useful from my perspecive, a look at the evolved Microsoft Store
That’s another exciting week completed, have a fab weekend!