Explore >> Select a destination


You are here

eskonr.com
| | kasperjohansen.net
12.6 parsecs away

Travel
| | Following my article Getting started with Global Secure Access - Private Access, I want to share how to deploy the Global Secure Access (GSA) client and elaborate on the various registry modifications currently available for the client. In this article I'll use the Powershell AppDeploy Toolkit a
| | powershellisfun.com
13.1 parsecs away

Travel
| | One of our customers wanted to be sure that there were no additional accounts in the local Administrators group on their Intune devices, and... That's where Custom Compliance policies come in :) In this blog post, I will show you how to automatically check the Administrators group and mark the device as non-compliant if needed.
| | azurecloudai.blog
7.6 parsecs away

Travel
| | I have come across customers who auto enroll Azure AD domain joined Windows 10 devices in Intune and use the device management capabilities like enforcing compliance polices, configuring certificates, Wi-Fi, VPN, Endpoint and other profiles. These devices are remotely used, and IT team does not have much control. Most frequent ask is to rename the...
| | csharp.christiannagel.com
70.3 parsecs away

Travel
| Authentication and authorization is a built-in feature of ASP.NET Core. Creating an application, you can select to authenticate with the Azure Active Directory or the Azure Active Directory B2C, or store user information in a local database with the Web application. This article gives you the information to use local accounts, create roles programmatically from...