Embrace the Future Endpoint – Part 2

Introduction and recap In the first part of our series, we embarked on an exploration of the evolving landscape of endpoint management. We discussed the ‘Future Endpoint’, an emerging concept representing the wide array of devices and systems that businesses must now manage. We scrutinized traditional endpoint management […]

Embrace the Future Endpoint – Part 1

Introduction I’ve been working with Windows client management for about 17 years, and I will try to give my angle on the journey and what makes the Endpoint of the Future here now. Do you remember the early days when it was all about managing desktop computers within […]

Windows 365: Perfect Test Environment

Having 32GB of memory isn’t a novelty in today’s tech world. We’ve had powerful desktop machines and servers with such capabilities for some time. However, the real question isn’t just about having that capacity – it’s about how we can unleash its full potential. Enter Windows 365 Cloud […]

Local Administrator on MacOS?

When onboarding macOS with Apple Business Manager and Intune, there are a few important security considerations to keep in mind. Specifically, it’s crucial to control the level of access each user has on a device, and this includes the potential issue of local users obtaining administrator rights. When […]

What should we choose – W365 or AVD?

As an IT consultant, I’ve had the privilege to work with various clients, each with their unique set of challenges and requirements. This diverse experience has allowed me to compare and contrast Microsoft’s Windows 365 and Azure Virtual Desktop (AVD) in real-world scenarios. I’ve witnessed these technologies in […]

Security Baseline as Settings Catalog

Have you ever tried using the Security Baseline feature in Intune’s Endpoint Security to enhance your device’s security? If you have, but also encountered the frustration of finding certain settings missing – so you still need to create a Configuration Profile. Here is a tip that is quit […]

Enroll Windows 365 Business in 3 steps

Windows 365 Business and Enterprise has been around for the last year and the companies begin to see all the advantages to easy deploy a Windows pc. In this post I want to show how easy it is to deploy Windows 365 Business for a user. Are you […]

Proactive Remediations – MS Defender

Microsoft Defender on each client is a high important tool as it both are an Antivirus tool – but also deliver info to Defender for Endpoint as a sensor. Microsoft developed Tamper Protection that should make sure evil software/process not should be able to disable Microsoft Defender. But […]