How to protect Azure AD App proxy (AAP) applications on windows 10 using intune windows information protection (WIP) from DLP

  Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. Windows Information Protection (WIP), helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that…
SCCM Configmgr CB 1802 SQL Views documentation

  With the release of SCCM Configmgr current branch 1802 ,there are some exciting features added from its previous version 1710. When there are new features released ,certainly there will be changes to the database hence sql views/tables created which will help us to create some nice SSRS reports for reporting. So with this current…
SCCM Configmgr Current Branch 1802 is now available new features and product enhancements!

  Microsoft released Configuration Manager Current Branch build version 1802 an in-console update. You can apply this update on sites that run version 1702, 1706, or 1710. This build also available as baseline version which means, you can use this media to install new ConfigMgr sites. You can download the baseline media either from MVLS…
SQL query to get client count with status active obsolete missing for collections in tabular column

  Quick blog post on how to get client count with active obsolete and missing status for collections in a nice tabular column. I used 3 SQL views in this query V_r_system ,v_FullCollectionMembership_valid  and v_Collection with sum and case statements. You can use this SQL code in report creation with collection prompt and also create…
Different methods to setup Azure MFA Registration for O365

  Introduction: This is going to be my 2nd or 3rd blog on Azure MFA (Multifactor authentication). Azure MFA is Two-step verification is a method of authentication that requires more than one verification method and adds a critical second layer of security to user sign-ins and transactions. It works by requiring any two or more…