Zero Trust Common Identity and Device Access Protection
This is the 3rd step in the series Zero to Zero Trust in an automated way. In the previous steps, we …
Continue ReadingThis is the 3rd step in the series Zero to Zero Trust in an automated way. In the previous steps, we …
Continue ReadingIdentities are the key to environments and must be configured as securely as possible. To achieve …
Continue ReadingNowadays a good cloud environment has strict security policies. Well-known policies are conditional …
Continue ReadingI show in this blog how to create a device configuration profile based on the settings catalog in …
Continue ReadingAn Azure tenant is the Microsoft public cloud base. It is very important to keep your bases as …
Continue ReadingIn this 4th slice of Prepare Azure DevOps for AVD deployment series, I will show how to copy or …
Continue ReadingOut of the box, Microsoft Intune has a reporting platform where lots of information is stored. Think …
Continue ReadingDuring writing automation blog posts about deploying security baselines automated, I felt the need …
Continue ReadingEarlier I explained how to use the REST API to get more information about Azure file shares. This is …
Continue ReadingIn this blog post, I explain how to secure and optimize AVD and CloudPC environment using Microsoft …
Continue ReadingIn this blog post, I explain how to configure FSLogix for Azure AD-joined machines automated. Also, …
Continue ReadingIn this article, I explain how to distribute OneDrive with Microsoft Endpoint Managed based on …
Continue ReadingIn this post, I will show how to install applications with Windows Package Manager (or Winget), …
Continue ReadingWelcome (back) to the AVD Automation Cocktail. In the past cocktail series , I showed different AVD …
Continue ReadingIn this article, I explain a way how to manage Windows Updates for Azure Virtual Desktop (AVD). To …
Continue Reading