You are here |
eskonr.com | ||
| | | |
kasperjohansen.net
|
|
| | | | Following my article Getting started with Global Secure Access - Private Access, I want to share how to deploy the Global Secure Access (GSA) client and elaborate on the various registry modifications currently available for the client. In this article I'll use the Powershell AppDeploy Toolkit a | |
| | | |
powershellisfun.com
|
|
| | | | One of our customers wanted to be sure that there were no additional accounts in the local Administrators group on their Intune devices, and... That's where Custom Compliance policies come in :) In this blog post, I will show you how to automatically check the Administrators group and mark the device as non-compliant if needed. | |
| | | |
azurecloudai.blog
|
|
| | | | I have come across customers who auto enroll Azure AD domain joined Windows 10 devices in Intune and use the device management capabilities like enforcing compliance polices, configuring certificates, Wi-Fi, VPN, Endpoint and other profiles. These devices are remotely used, and IT team does not have much control. Most frequent ask is to rename the... | |
| | | |
csharp.christiannagel.com
|
|
| | Authentication and authorization is a built-in feature of ASP.NET Core. Creating an application, you can select to authenticate with the Azure Active Directory or the Azure Active Directory B2C, or store user information in a local database with the Web application. This article gives you the information to use local accounts, create roles programmatically from... |