Daniel Engberg

11.3K posts

Daniel Engberg banner
Daniel Engberg

Daniel Engberg

@danielclasson

Principal Consultant & Co-Founder @agdiwo | Focus on #msintune, #configmgr, #windows11. I love finding better ways of doing things.

Sweden Beigetreten Ocak 2010
1.1K Folgt3.1K Follower
Daniel Engberg retweetet
Bryan Dam
Bryan Dam@bdam555·
#ConfigMgr/#SCCM peeps: new update for 2503/2509 that removes all attempts to set Scan Source settings. Unless you actively want some updates (ex. FUs) from ConfigMgr and others (ex. CUs) from Intune, then you never needed Scan Source in the first place. learn.microsoft.com/en-us/intune/c…
English
2
23
62
6.1K
Daniel Engberg retweetet
Adam G
Adam G@AdamGell·
CMTrace Open 0.3.0 is out. New in this release: DSRegCmd analysis for device identity troubleshooting, including live capture, pasted output, evidence bundle support, and Windows Hello for Business context. More than a log viewer now. github.com/adamgell/cmtra… #msintune
English
2
9
42
2.5K
Daniel Engberg retweetet
VAISHNAV K
VAISHNAV K@vaishnavk93·
📌 Have you seen this update yet? Recovery for #Windows 365 Enterprise Cloud PCs that were deprovisioned due to license expiration is now generally available. Intune Admin Center > Tenant administration > Alerts > Alert Rules > Cloud PCs in grace period #W365 #MSIntune #Alerts
VAISHNAV K tweet media
English
0
1
4
663
Daniel Engberg retweetet
@rnabmitra
@rnabmitra@rnabmitra·
Update your #MSIntune managed #macOS LAPS policy to customize the Admin Password rotation schedule from the default 180 days
@rnabmitra tweet media
English
0
7
24
1.9K
Daniel Engberg retweetet
Adam G
Adam G@AdamGell·
CMTrace Open v0.2.0 is out. An open-source CMTrace-style log viewer with built-in Intune diagnostics, timeline analysis, download stats, error lookup, live tailing, and Windows signed release assets. Release: github.com/adamgell/cmtra… #msintune #intune #sccm #configmgr #MEM
English
0
33
116
5.3K
Daniel Engberg retweetet
WhiskeyHacker
WhiskeyHacker@whiskeyhacker·
Taken from the Stryker Handala / Intune Detection Pack v2 "Check PIM role settings for Global Administrator, Intune Administrator, and Cloud Device Administrator. If you see only the "Require Azure MFA" checkbox and no Authentication Context configured, you have the same gap that enabled the Stryker wipe. Configure Authentication Context with FIDO2 or certificate-based auth today. Enable Intune Multi-Admin Approval for wipe, retire, and delete actions. Tenant Administration > Multi Admin Approval. Under 10 minutes. No additional licensing required. Deploy Rule 13 (bulk wipe threshold alert). Five wipes in 15 minutes from a single identity fires the alert. Wire it to a Logic App that calls revokeSignInSessions on the triggering account via Microsoft Graph. " link to Detection Pack v2 blog and direct download. Please share so others can lock down their InTune environments please threathunter.ai/blog/iran-hand…
English
4
50
276
52.5K