How to deploy SCCM Remote Control Bits (standalone) to clients without ConfigMgr Console being installed

Introduction/Problem: We are in process of completing office 365 project to all users which bring teams and other products as part of office 365. We are using Lync/Skype for business as collaboration tool prior to office 365 project but once the project started ,every one is on teams hence we can decom lync servers and…
SCCM Configmgr Current Branch 1806 is now available

Microsoft just released SCCM Configmgr Current Branch 1806 as in-console update for first wave customers (opt-in) which means ,you can run PowerShell script to get this update in your console . This build can be applied to your Configmgr sites running on 1706 ,17010 and 1802 .This build version is not available as standalone media…
Office 365 Reports Show anonymous IDs instead of names in all reports or Power BI content pack

Introduction: The other day ,i was looking at Activity Reports in the Office 365 admin center. Office 365 admin center provide you the usage report for multiple products like email,onedrive,SharePoint,teams ,office activations etc. Using these reports, we can identify how good ,office 365 is being used by users and also help you to plan for…
Why is Additional security verification option (MFA) not available in office 365 user portal

Introduction: This is quick post on Azure MFA (multi factor authentication) . Azure MFA is Two-step verification is a method of authentication that requires more than one verification method and adds a critical second layer of security to user sign-ins and transactions. It works by requiring any two or more of the verification methods. To…
How to export Intune MAM policy settings using powershell ?

  I had request from security asking for updated intune App protection (MAM) policies . When the request come, i was trying to look for document in SharePoint portal if there any created .As part of intune implementation policy ,there should be a document that refers app protection policies according to the security requirement. In…