image

Removing Device Primary User from Local Administrator Group by Using Intune Profiles

First off, if you are still pondering the age old question “Should my users be local admin or not” I’m gonna help you right here: No, No, a Thousand Times No。 The only good reason I can think of for letting your users be local administrators is if you have too much money & time Read More

image

How to Add a MacOS DMG App to Microsoft Intune

Use the information in this article to help you add a macOS DMG app to Microsoft Intune. A DMG app is a disk image file that contains one or more applications within it. Many common applications for macOS are available in DMG format. For more information about how to create a disk image file, see Apple’s Read More

image

How to Register Printers with Microsoft Universal Print by Using the Universal Print Connector

 The connector must have access to the following endpoints: https://login.microsoftonline.com https://aadcdn.msftauth.net *.print.microsoft.com Follow the steps here to install the connector and sign in to the connector app using a tenant user that has the Global Administator or the Printer Administrator role. Select the printers your want to register from the Available Printers list and click the Register button.  Tip Refer to Read More

image

How to Use a Digital Signature on Outlook

Digitally sign a single message In the message, on the Options tab, in the Permission group, click Sign Message. If you don’t see the Sign Message button, do the following: In the message, click Options. In the More Options group, click the dialog box launcher  in the lower-right corner. Click Security Settings, and then select the Add digital signature to this message check box. Click OK, and then click Close. If Read More

image

How to Manage Locations with Microsoft 365

Location Location helps your users find addresses and locate your organization’s buildings by providing an accurate location for offices, campuses, and buildings, along with directions and navigation. Administrators should add all important locations of your organization. Unlike Bookmarks and Q&A, the index is not refreshed immediately, and it can take several hours for new or Read More

image

How to Mitigate CVE-2023-36884 Security Vulnerability

Mitigations Customers who use Microsoft Defender for Office are protected from attachments that attempt to exploit this vulnerability. In current attack chains, the use of the Block all Office applications from creating child processes Attack Surface Reduction Rule will prevent the vulnerability from being exploited. Organizations who cannot take advantage of these protections can set the FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION Read More