TeamViewer Silent Install (Intune)

TeamViewer is a software application that facilitates remote control, desktop sharing, online meetings, web conferencing, and file transfer between computers. In this article, I’ll guide you through the process of performing a silent installation of TeamViewer using the EXE installer via the command line. This approach allows you to deploy TeamViewer efficiently on company workstations … Read more

Security Management with Microsoft Defender for Endpoint (without Autopilot)

Microsoft Defender for Endpoint simplifies security management for devices beyond Microsoft Endpoint Manager (MEM) enrolment. It acts as a guardian, enforcing and reporting policies assigned via MEM. Devices integrated into Azure Active Directory (Azure AD) become part of the MEM, Azure AD, and Microsoft 365 Defender ecosystems. Steps to configure MDE To enable Security Management for Microsoft Defender for Endpoint, … Read more

Enable users to uninstall win32 applications from Company portal

Microsoft has now introduced native support for uninstalling both Win32 apps and Microsoft Store apps through the Windows Company Portal. To utiliZe this feature, end-users can uninstall Win32 apps and Microsoft Store apps if these apps were assigned as available and installed on-demand by the end-users themselves. For Win32 apps, users have the option to … Read more

Disable access to Store apps

In the past, Intune administrators had the capability to compel the utilization of the private or company store by implementing the policy “Only display the private store within the Microsoft Store app.” However, this measure did not entirely prevent end-users from directly navigating to the public store through the utilization of the Windows Package Manager … Read more

How to create custom compliance policy in Intune

As the digital landscape evolves, our approach to device management and security must also adapt. Next, we explore a cutting-edge capability within compliance policies in Intune: custom compliance settings. These settings empower IT administrators to assess various aspects of a device’s configuration and use the findings to determine its compliance status. By leveraging PowerShell scripts within custom compliance … Read more

Endpoint Privilege Management in Microsoft Intune

Introduction As Microsoft introduces Endpoint Privilege Management (EPM) is an important solution for organizations to enhance security. It focuses on managing privileges for endpoints (devices) within an organization. We already have some custom EPM solutions available till date, Byond trust, Thycotic EPM are couple of dominant names since long. But Microsoft realized this as good … Read more