Intune Compliance Policy

Intune Compliance Policy

The compliance policy in Intune is an important point because it makes it possible to verify that mobile device complies with security constraints. Several parameters can be configured in the compliance policy.

  • Using a password to access devices
  • Encryption of the device
  • Prohibit jailbroken or root device
  • Minimum operating system version required
  • Maximum allowed version of the operating system
  • Require the device to be at or below the level of defense against mobile threats

Lire la suite de

hybrid equipment with Azure AD

We have had the possibility for many years to join a machine to an Active Directory domain. With cloud services (Office 365, Azure AD, …) identity management has become a very important point. Microsoft implemented in Windows 10, the functionality Azure AD Join (previously Workplace Join) allowing the junction of the machine in Azure AD Join.

Several hybridization scenarios can be implemented:

  • Device Writeback : To allow a computer join to Azure AD to access internal resources.
  • Azure AD hybrid : This scenario allows a computer attached to an AD domain to access cloud resources.

Lire la suite de

Azure File Sync

Azure File Sync

Files are an important resource in a company. For workstations rarely connected to the local network, these files are stored locally.
It is therefore important to ensure that these files are synchronized on an enterprise server or in the cloud. All protocols offered by Windows Server (SMB, NFS et FTPS) are available in Azure File Sync.

Lire la suite de

Install Configure ATA

What isAdvanced Threat Analytics

Advanced Threat Analytics also known as ATA is the only solution on premise of the EMS suite. This platform, which is present in a local network, protects the information system of a company against cyber attacks (targeted attacks, sophisticated attacks, internal threats, etc.). To locate these attacks, the elements present in the local network allow users to learn their behavior. This is for one purpose only: to define a behavioural profile and thus define abnormal behaviours.

Lire la suite de

Reset MDM Authority

What is the MDM Authority

Before any Microsoft Intune implementation project, a choice should be made between setting up a Microsoft Intune platform in standalone or hybrid mode (with System Center Configuration Manager). It is necessary to know the two solutions, but also the advantages and disadvantages of these solutions. Switching from one mode to another has been simplified from System Center Configuration Manager 1610. It is no longer necessary to contact Microsoft support for this. This is discussed in the next chapter.
Lire la suite de

Cloud APP Discovery

Cloud APP Discovery

It is unfortunately common to see in a company of cloud applications (dropbox,…) used in services unless the IT team is aware. This can cause data loss and security problems. Cloud App Discovery is a feature present with the Premium of Azure AD version, it allows to perform application detection cloud used by the company.
Lire la suite de

Backup Nas Synology on Azure

Backup Nas Synology on Azure

If you have a Synology NAS, it may be interesting to enable backup of this NAS in the cloud. So even in the event of loss of a drive (and if the RAID has not been enabled), it is possible to recover the data easily.
It is possible to backup in several cloud, this article is about the backup in Azure.

Lire la suite de

Active Android for Work

Android for Work and Intune

Android for work allows a more complete management of Android mobile. It allows to expand the possible configurations in an MDM as Microsoft Intune.
Several benefits are provided by this solution which:
Lire la suite de