Modern Workplace Consultant | Automation Geek

.

M365 License Assignment Report

Table of ContentsIntroductionRequirementsFeaturesHow does it work? Interactive AuthenticationClient Secret AuthenticationCertificate AuthenticationAccess Token AuthenticationManaged Identity AuthenticationEmail FunctionalityConclusion Introduction Every administrator knows the problem of licenses and their allocation. This is often a drama to get a good overview and to review this periodically. I have run into this problem several times and often you…

Continue Reading

Entra ID Admin Roles Report

Table of ContentsIntroductionRequirementsFeaturesHow does it work? Interactive AuthenticationClient Secret AuthenticationCertificate AuthenticationAccess Token AuthenticationManaged Identity AuthenticationEmail FunctionalityConclusion Introduction Every administrator knows the problem of managing roles and permissions. It’s often a struggle to get a good overview of who has access to what, and reviewing this periodically can be a real headache. I’ve encountered…

Continue Reading

🚀Introducing ASR Rule Inspector V2

Table of ContentsIntroductionWhat’s New in the V2? Intune vs Local Comparison – No More Policy GuessworkDetecting Duplicate and Conflicting RulesSee What’s Really in Those Exclusion FoldersHTML reportUse CasesVerify Policy AssignmentsAnalyze ASR RulesAudit ASR ExclusionsCFA Compliance ChecksIntune Debug ToolkitConclusion Introduction After some incredibly valuable feedback and a few feature requests, I’m excited to share…

Continue Reading

ASR Rules: The Importance of Configuration and Verifying with the “ASR Rule Inspector”

Introduction In today’s evolving threat landscape, cybercriminals continuously exploit vulnerabilities in systems and applications. Attack Surface Reduction (ASR) rules help mitigate these risks by limiting the ways malware and threat actors can infiltrate an organization. By enforcing strict policies on script execution, Office macros, and other attack vectors, ASR rules reduce exposure to…

Continue Reading
  • Microsoft Intune: Wrangling devices and keeping them secure is my jam.
  • Automation & Remediation: If it can be automated, I’ll automate it. If it’s broken, I’ll fix it (automatically, of course). 🤖
  • Advanced Monitoring: Keeping a watchful eye on everything, so you don’t have to. 📈

Think of this blog as your go-to resource for practical tips, in-depth tutorials, and real-world insights. We’ll explore how to leverage these powerful tools to optimize your M365 environment, boost productivity, and keep your data safe.

Let’s dive in and unlock the full potential of M365 together! 💻✨