In this blog we’ll demystify timestamping, cover why it’s an important process in the management of third-party apps and updates in WSUS, ConfigMgr and WSUS, and how you can test it effectively. When managing third-party applications and updates with tools like WSUS,...
Introduction The recommended way to deploy Microsoft 365 in an organization is through the config.office.com portal. This site helps IT administrators deploy, manage, monitor, and secure Microsoft 365 apps within their organizations. This blog will focus on the...
Microsoft recently announced the Local Administrator Protection feature, a powerful feature for securing local admin accounts by isolating privileges and preventing token theft. However, when paired with Endpoint Privilege Management (EPM), things can get complicated....
Removing the built-in (sometimes even unwanted) Windows Apps after an Autopilot deployment seems pretty straightforward. Just fire up PowerShell, run a few commands to uninstall the built-in Windows 10/11 Apps for all users, and watch the clutter disappear. But what...
Have you ever wondered what keeps the Intune Management Extension (IME) secure from accidental or unauthorized uninstallation? If you thought certificates were just about enrollment and secure communication, think again! In this blog, we will uncover a hidden layer of...
Microsoft has recently introduced a mind-blowing feature called Hotpatch AKA Rebootless for Windows 11 Enterprise (version 24H2) and Windows 365 Enterprise. This feature allows quality updates to be applied without requiring a system restart, making it a game-changer...