This month, we had a company event at Rapid Circle and I did a presentation about Security Baselines vs Endpoint Protection templates vs Settings Catalog vs device configuration policies. Yeah… that’s a mouth full. For a change, I didn’t want to do a technical deep dive, but instead, talk more about some best practices and […]
Category: Intune

Password Freedom
What does going passwordless mean to you? Think about that for a minute. It’s a long journey and we can’t get there in a few clicks. I’ve seen a lot of different implementations, but to me, going passwordless means password freedom. It means I no longer need to remember a complex string of letters, numbers, […]

Testing virtual Android Devices with Microsoft Endpoint Manager
When you’re testing Microsoft Endpoint manager, chances are, you’re using a virtual Windows 10 device to do most of your testing. For Windows 10, there are many virtualization platforms like Hyper-V, VMWare or Virtual Box. But when it comes to Android, it’s a different ballgame. There are emulators out there, but I find that most […]

Passwordless authentication with windows 10 and Azure AD
While passwordless authentication with Windows 10 and Azure AD is possible for quite some time, many organizations still use older and less secure authentication methods. I guess there is still a lot of mystery around going passwordless. Some System administrators are concerned about difficult time consuming configuration changes and user adoption challenges. With this blog, […]

WIP Learning Mode
When you first start with Windows Information Protection (WIP), you might want to consider starting with the Protection Mode set to Silent. This is also called Windows Information Protection Learning Mode or WIP Learning Mode. In silent/learning mode WIP runs silently and will not block anything. It will however encrypt and log all actions including […]

Monitoring and collecting WIP audit event logs
Let’s have a look at collecting WIP audit event logs using Azure Monitor and how to read and monitor event logs from Windows 10 devices. Windows Information Protection offers data separation, keeping corporate and personal data separate, and leak protection, by blocking the use of cut and paste actions. Most events triggered by Windows Information […]

Troubleshooting Windows Information Protection on Windows 10
Troubleshooting Windows Information Protection can be a lengthy and time consuming process. If all goes according to plan, you can sit back and relax. If not, I hope this post will help you get on the right track again. There are a couple of other post you might want to read: This post is part […]

Azure Rights Management for WIP
This post is part of the Windows Information Protection (WIP) series. Firstly I walked through the basic, the actual WIP configuration and deployment. Secondly I wrote about the user experience on both MDM enrolled (company owned) and BYO devices (personally owned). Finally in this post I will focus on Azure Rights Management and how it […]

WIP-WE User Experience
In this post I’ll focus on WIP-WE User Experience. Also known as Windows Information Protection without enrollment on Windows 10 devices. WIP Without Enrollment is a great solution for organizations supporting a BYOD solution. In addition, WIP-WE provides a degree of control to manage and secure corporate data on personal devices. If you want to […]

Windows Information Protection User Experience
In this post I’ll focus on Windows Information Protection user experience (WIP) on MDM enrolled Windows 10 devices. If you haven’t read my previous post about WIP, have a look below. This post is part of a series. Have a look at my other posts for more information about WIP. Introduction to Windows Information Protection […]