Deploy Email profile

Deploy Email profile intune allows to deploy an email profile on registered devices. It is thus possible to automate the configuration of an email profile on one or more devices. It is interesting to note that the

Read More

Intune Compliance Policy

Intune Compliance Policy The compliance policy in Intune is an important point because it makes it possible to verify that mobile device complies with security constraints. Several parameters can be configured in

Read More

Azure File Sync

Azure File Sync Files are an important resource in a company. For workstations rarely connected to the local network, these files are stored locally. It is therefore important to ensure that these files are

Read More

Install Configure ATA

What isAdvanced Threat Analytics Advanced Threat Analytics also known as ATA is the only solution on premise of the EMS suite. This platform, which is present in a local network, protects the information system of a

Read More

Reset MDM Authority

What is the MDM Authority Before any Microsoft Intune implementation project, a choice should be made between setting up a Microsoft Intune platform in standalone or hybrid mode (with System Center Configuration

Read More

Cloud APP Discovery

Cloud APP Discovery It is unfortunately common to see in a company of cloud applications (dropbox,…) used in services unless the IT team is aware. This can cause data loss and security problems. Cloud App

Read More