- 62
- 100 671
How IT Works
India
เข้าร่วมเมื่อ 3 ม.ค. 2022
Welcome to our TH-cam channel dedicated to Information Technology! Here, you'll find the latest news and updates on the ever-evolving world of IT. We'll cover topics such as cloud computing, cybersecurity, artificial intelligence, and more. Our goal is to provide you with the knowledge and resources you need to stay ahead of the curve in the IT industry. So, subscribe now and join us on our journey to explore the world of IT!
I will try to cover topics related to Intune, Azure Active Directory, Defender ATP, Defender for Apps, Defender for Office, and many more with explanations and demos.
I will try to cover topics related to Intune, Azure Active Directory, Defender ATP, Defender for Apps, Defender for Office, and many more with explanations and demos.
Block user sign-in from Non-Compliance Device with Conditional access policy
Block user sign-in from Non-Compliance Device with Conditional access policy
=================================================
#office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory
#defenderforoffice #defenderforApps #MCAS #mailflow
Microsoft 365 Setup and configuration
Office365 setup and configuration
Free offie365 admin Course
Free exchange admin course
Free Microsoft 365
exchange online
Microsoft Intune
Endpoint manager
Defender for office
defender for endpoints
Defender for apps
=================================================
#office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory
#defenderforoffice #defenderforApps #MCAS #mailflow
Microsoft 365 Setup and configuration
Office365 setup and configuration
Free offie365 admin Course
Free exchange admin course
Free Microsoft 365
exchange online
Microsoft Intune
Endpoint manager
Defender for office
defender for endpoints
Defender for apps
มุมมอง: 1 053
วีดีโอ
Local Administrator Password Solution" (LAPS) | Intune
มุมมอง 8217 หลายเดือนก่อน
"Local Administrator Password Solution" (LAPS) is a Microsoft solution that automatically manages local account passwords on domain-joined computers. The goal is to mitigate the risk associated with the use of a common local account across multiple machines. When configured, LAPS automatically sets and rotates a unique password for the local Administrator account on each computer. To create loc...
Mastering SMTP Mail Flow: Exchange Troubleshooting Guide | Exchange Online
มุมมอง 7267 หลายเดือนก่อน
Unlock the secrets to seamless email communication with our comprehensive guide to troubleshooting SMTP mail flow using Microsoft Exchange. Dive deep into the tools and functionality offered by Exchange, empowering you to diagnose and resolve any issues hindering your email delivery. From pinpointing root causes to implementing effective solutions, this tutorial equips you with the knowledge an...
Block user sign-in from unknown location | Conditional Access
มุมมอง 1.9K7 หลายเดือนก่อน
Here are some ways to block users from signing in from an unknown location: Microsoft Entra Sign in to the Microsoft Entra admin center as a Conditional Access Administrator, then create a new policy. Under Target resources, select Cloud apps, then Include, and select All cloud apps. Under Conditions, select Location, then under Access controls, select Block Access. Confirm your settings and se...
Mastering Intune: 5 Efficient Methods to Sync Your Windows Devices
มุมมอง 3057 หลายเดือนก่อน
Welcome to our comprehensive guide on syncing Windows devices in Intune! In this video, we'll explore five powerful methods to ensure seamless synchronization for optimal device management. Whether you prefer using the Intune console, leveraging GraphExplorer API, or employing straightforward settings adjustments, we've got you covered. Plus, we'll dive into restarting services and devices for ...
Activating Windows OS: Business Premium vs. E3 License Explained | Intune
มุมมอง 8518 หลายเดือนก่อน
Are you confused about the differences between activating Windows OS with Business Premium and E3 licenses? Look no further! In this video, we break down the activation process step-by-step, comparing the features and benefits of each license type. wmic path softwarelicensingservice get OA3xOriginalProductKey rundll32 clipc.dll, ClipCleanUpState restart the system login with the licensed user. ...
How to install google Chrome /Edge browser Extension with Intune
มุมมอง 2.3K10 หลายเดือนก่อน
install google Chrome /Edge browser Extension with Intune #office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory #defenderforoffice #defenderforApps #MCAS #mailflow Microsoft 365 Setup and configuration Office365 setup and configuration Free offie365 admin Course Free exchange admin course Free Microsoft 365 exchange online Microsoft Intune Endpoint manager Defender for offi...
How to create intune configuration profile and assign
มุมมอง 66610 หลายเดือนก่อน
How to create Microsoft intune configuration profile and assign #office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory #defenderforoffice #defenderforApps #MCAS #mailflow Microsoft 365 Setup and configuration Office365 setup and configuration Free offie365 admin Course Free exchange admin course Free Microsoft 365 exchange online Microsoft Intune Endpoint manager Defender fo...
Q and A - 1
มุมมอง 17510 หลายเดือนก่อน
This video for answers for your comments on my video #office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory #defenderforoffice #defenderforApps #MCAS #mailflow Microsoft 365 Setup and configuration Office365 setup and configuration Free offie365 admin Course Free exchange admin course Free Microsoft 365 exchange online Microsoft Intune Endpoint manager Defender for office de...
Improve Email security with NEW DMARC policy | Exchange Online
มุมมอง 955ปีที่แล้ว
By default, Microsoft 365 includes built-in features that help protect your users from phishing attacks. Set up anti-phishing polices to increase this protection. For example, you can refining the settings to better detect and prevent impersonation and spoofing attacks. The default policy applies to all users within the organization. You can create custom, higher priority policies for specific ...
Microsoft 365 Report Message Add-in | deploy & configure | Defender for office
มุมมอง 4.5Kปีที่แล้ว
The Report Message add-in provides the option to report both spam and phishing messages #office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory #defenderforoffice #defenderforApps #MCAS #mailflow Microsoft 365 Setup and configuration Office365 setup and configuration Free offie365 admin Course Free exchange admin course Free Microsoft 365 exchange online Microsoft Intune Endp...
Microsoft Office 365 Quarantine Policy | How to manage quarantined messages
มุมมอง 4.7Kปีที่แล้ว
how to manage quarantined messages as an Office 365 user / Admin #office365 #intune #ExchangeOnline #Microsoft365 #VM #azureActiveDirectory #defenderforoffice #defenderforApps #MCAS #mailflow Microsoft 365 Setup and configuration Office365 setup and configuration Free offie365 admin Course Free exchange admin course Free Microsoft 365 exchange online Microsoft Intune Endpoint manager Defender f...
How to choose the right Microsoft 365 license
มุมมอง 370ปีที่แล้ว
How to choose the right Microsoft 365 license
Defender for Business VS Microsoft Defender for Endpoint
มุมมอง 4.3Kปีที่แล้ว
Defender for Business VS Microsoft Defender for Endpoint
How to create Win32 app | Install adobe Reader DC | Intune
มุมมอง 4.7Kปีที่แล้ว
How to create Win32 app | Install adobe Reader DC | Intune
Install apps with Intune | Google Chrome | Part 9
มุมมอง 584ปีที่แล้ว
Install apps with Intune | Google Chrome | Part 9
Microsoft Intune part 8 | Intune Device Filters
มุมมอง 574ปีที่แล้ว
Microsoft Intune part 8 | Intune Device Filters
Microsoft Intune part7 | Manage BitLocker policy
มุมมอง 3.7Kปีที่แล้ว
Microsoft Intune part7 | Manage BitLocker policy
Microsoft Intune part6 | Intune windows Update Policy
มุมมอง 582ปีที่แล้ว
Microsoft Intune part6 | Intune windows Update Policy
Microsoft Intune part5 | Windows 10/11 compliance policy
มุมมอง 587ปีที่แล้ว
Microsoft Intune part5 | Windows 10/11 compliance policy
Microsoft Intune | part 4 | Windows Autopilot
มุมมอง 358ปีที่แล้ว
Microsoft Intune | part 4 | Windows Autopilot
Conditional Access: Block access by location
มุมมอง 7Kปีที่แล้ว
Conditional Access: Block access by location
HOW TO USE AZURE JUST IN TIME JIT IN MICROSOFT 365
มุมมอง 1.3Kปีที่แล้ว
HOW TO USE AZURE JUST IN TIME JIT IN MICROSOFT 365
SPF Record: What it is and Why it Matters
มุมมอง 421ปีที่แล้ว
SPF Record: What it is and Why it Matters
DMARC | What it is and Why it Matters | How to setup DMARC
มุมมอง 763ปีที่แล้ว
DMARC | What it is and Why it Matters | How to setup DMARC
DKIM Record: What it is and Why it Matters
มุมมอง 890ปีที่แล้ว
DKIM Record: What it is and Why it Matters
Very informative video. Why can't Microsoft create simple straightforward videos like this is beyond me. Thanks bud keep up the great work!
Hi Amol, I want to connect with you, can you please share your email id or number?
Hi Amol, can you please share your contact details, email ID or phone number?
Hi Amol, can you please share your number or email ID to contact you?
Thanks for making this video, I could not find one video on TH-cam which talks about creating an Admin account on the device using PowerShell script, I was new to this, and was struggling a bit, I will try to use ur PowerShell script to make it work.
Great explanation.
You missed a big part. How to get the MSI info.
thanks, you have helped me! take care!
why i cant create profile? its grey. but im intune and device administrator.
It's will work for Ios
Could you please let me know what would be the ideal way to configure a policy if i wants to block all the countries and only allow users to login from the country where our office resides I know we can simply create this using named location and CA But what if any of my users travelling and i need to give them access to those countries as well.(only that user) i also dont want that user to get access to any other country than where she is travelling and office locations I will give you an example. My office resides in india. So i created a names location named office location and selected india . Created a policy excluding office location i.e india . Included any location . Grant acess block for all users. Now for eg if my CEO is travelling to UK , i want to allow him to login to all apps from india as well as UK. So if i exclude him from the main policy , he would be able to login from anywhere. But i only want him to login from uk and india. Secondly if i exclude him from main policy and create a new names location travel country and add UK. And create a new CA policy adding only my CEO and blocking any location excluding travel country. Would he be able to login only from uk or india and uk?? Secondly everytime when user travels we have to add them to secuity group and remove later which is a lot manual work So what would you suggest You help would be much appreciated . Thanks again for the swift response
What I can suggest is you create a separate CAP for grant access then you create a named location (Allowed Travel location something like that) and only select UK and India from that policy so even if the CEO returned in India it wouldn't get him blocked, then you include that Network Condition to the policy to only grant access if the user's location is in Include Named Location and excluded access to any Countries.
How to utilize microsoft report phishing for phising exercise? Can it be configured to sent the reported email to specific mailbox? So my phishing tools can listen which user are reported the phishing as positive behavior
Voice is very low for videos created 😢
You didn't show when to use guest user, difference between contacts and guest users and about licenses. Thanks
I would drop the start were you say "your not going to subscribe"
For small businesses and individuals, Microsoft Defender For Endpoint is overkill. Its too much to install, configure and run. MDB is a simplified subset that adds more to the free tier of MD. You get NGAV and the ability to secure your endpoints to deter ransomware attacks and zero day threats. It doesn’t have as comprehensive a protection level as the Endpoint tier but for small businesses and individuals they aren’t as much of a concern and those policies aren’t needed.
Gives me an error.
Thanks!
Here's the thing - you so easily demonstrated how you could VPN and test signing in from the blocked country, it's just as easy to VPN to appear to be from the allowed country. Why even bother setting a "specific country only" Conditional Access by Location policy if bad actors can just use VPN to sign in "from United States"? Conditional Access by Location seems so incredibly useless. Am I missing something? I know it's only one piece of the security puzzle, but right now it seems like an utterly useless piece.
thanks for your question, i totally agree with you, for the solution to your query i have created another Video, Please have a look i hope that can help you!!! "Block user sign-in from Non-Compliance Device with Conditional access policy" th-cam.com/video/acdcle5u1rU/w-d-xo.html
thanks for your videos
I do these tasks everyday. I still cannot find a way as admin to see the actual email "content" the user sent. If emails are blocked, soemtimes admin need to see how the message text etc.. The interface for Message Tracking needs a lot of work by Microsoft - no subject search etc.
how can you edit that policies
Thank you 😊
like it !! short and sweet
Glad you liked it!
Thanks !!
Your voice is very low, can barely hear what your saying. even at full volume.
Thank you for taking time out of your busy schedule to make this video for us.
Wow after a long time, there's always something new to learn from your videos, I hope you upload more videos to Intune.
Thank you, I will
Very nice
Hi sir, Is there any option to check whether a particular Ioc is blocked or not? In Microsoft 365 defender console
Very well explained. Can you kindly explain gow to handle a scenario when same uaer travelled to a different location and the access needs to be granted.
very good video and nicely explain
Excellent, please cover all topics on security and compliance
Hello Amol, I need one information from your side Please share your email id or Contact no
I have configure bitlocker policy with save recovery key to azureAD option but in while encryption its not giving option for save to your azure AD account- I am using hybrid azure AD environment
I accidentally blocked a domain in TABL. How do i unblock that domain ?
Delete that domain from that list
Hello, what is the difference between Wvd, avd and windows 365?
Windows MSI line-of-business shouldn't be used, it's legacy now.
Yes but Microsoft windows store not fully supporting all the apps as on date. If you have msi package then easy to use at the moment
I want know if I'll buy plan2 MS give me 100gb email box additionally and 1.5tb archival space ?
Yes
26 new subs since you uploaded this video. Congratulations. No need to reply. Appreciate your content which has been very helpful.
Good
Thanks can you provide this PowerShell command
Keep doing good work bro. Do not loose hope
Thank you. Really well explained
Hi can you make a series on intune from zero to hero in intune. I am beginner and really looking out something from scratch on intune.
The default policy always confused me..never knew they were tied to default anti-spam\phish and anti-malware policy . super helpful
How to do a Lab to practice and Admin actions in Microsoft 360, Do you have a Free Lab in Microsoft 365
If you want to see what custom attribute/field a dynamic group is using to specify who gets emails how to you go back to look at that? currently I can find where to go to look that up.
for your answer, please check the below video (FAQ1 ) I have explained in detail.. th-cam.com/video/MegIbDhnB0U/w-d-xo.html
Hi all, There are two options available to encrypt drives: Option 01. under Endpoint Security > Disk Encryption and Option 02. through device configuration profiles. The requirements include saving the key to Azure AD and AD, with the need for silent encryption without a user interface. My question is, Q1. for SILENT BITLOCKER ENCRYPTION, which method should we choose, Option 01 or Option 02? Q2. If we create a profile only under Endpoint Security > Disk Encryption, will the encryption work? Q3. Or do we need to define BitLocker configuration in Endpoint Security, and use the same settings in the profile under device configuration? Q4. And same group assignment for profile created in option 1 and option 2.?
for your answer, please check the below video (FAQ1 ) I have explained in detail.. th-cam.com/video/MegIbDhnB0U/w-d-xo.html
how to release old quarantine email which is more than30days. please help
for your answer, please check the below video (FAQ1 ) I have explained in detail.. th-cam.com/video/MegIbDhnB0U/w-d-xo.html