GetSecureScore

How to Uninstall Software Using PowerShell

Most of us have uninstalled programs from our PCs. How have you done it? Can you recollect? We’ve done it mostly using the Control Panel or in some cases, if dealing with more complex suites, their own uninstall process.  These options are convenient to remove a single program, they’re not scalable. Imagine for a moment Read More

GetSecureScore

How to Register Printers with Microsoft Universal Print by Using the Universal Print Connector

 The connector must have access to the following endpoints: https://login.microsoftonline.com https://aadcdn.msftauth.net *.print.microsoft.com Follow the steps here to install the connector and sign in to the connector app using a tenant user that has the Global Administator or the Printer Administrator role. Select the printers your want to register from the Available Printers list and click the Register button.  Tip Refer to Read More

GetSecureScore

How to Disable Browser Password Saving from Intune

Purpose This article explains how to prevent browsers from remembering credentials via Microsoft Endpoint Manager (Intune). Prerequisites Office 365 Global Administrator Endpoint Manager Licensed and Deployed Instructions – Create Policy Login to Office 365 Admin Center. https://admin.microsoft.com/Adminportal Go to Endpoint Manager. Click on Devices. Go to Configuration Profiles. Click on Create Profile. Continue below for the browsers required. You will Read More

GetSecureScore

How to Change App Name on Azure Enterprise Applications

It is possible to change the name of your Enterprise Application, you can do so by going to your app and selecting properties. If you cannot see the name being updated. Make sure add yourself as the owner in the app service under Enterprise applications. Ref: https://stackoverflow.com/questions/57798813/how-to-update-azure-app-registrations-app-property https://learn.microsoft.com/en-us/answers/questions/404864/it-is-possible-change-name-on-enterprise-applicati

GetSecureScore

How to Secure and Restore a Compromised Microsoft 365 Mailbox

Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account. Do all of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure Read More