LATEST POSTS

pexels-kevin-ku-577585
Monitoring Microsoft Tunnel Gateway health with Power Automate
I want to give credit to my colleague Mark Hopper, whose work on monitoring various Intune connectors was a helpful reference for this post. Big shoutout to Mark. If you are interested in learning more...
raspberry-pi-g4651c9c19_1920
Transforming Your Raspberry Pi into a Secure Enterprise Wi-Fi Controller with 802.1x Authentication
For many IT pros, having a lab where different scenarios and configurations can be reproduced is essential. This allows to understand how and why things work the way they do. While some people learn by...
IME proxy
Proxying your way to Intune: How Intune Management Extension connects over a proxy
In this post, I will cover the conditions under which the Intune Management Extension uses a proxy to communicate with the Intune backend service.The Intune Management Extension, also known as IME, is...
padlock-g0ed5e48fe_1920
Enable Windows Defender Firewall logging in Microsoft Intune
UPDATE: with the Intune 2303 release, Endpoint security firewall policy now supports logging configurations. see: https://learn.microsoft.com/en-us/mem/intune/fundamentals/whats-new#endpoint-security-firewall-policy-support-for-log-configurations Following...