Getting started with compliance for Linux devices

This week is about a totally different platform as the last few months. This week is all about Linux devices. A few years ago, I wrote this post about supporting the unsupported platforms. This post will describe a solution that will address the biggest part of that challenge, as it will enable the compliance of Linux devices. All powered by the enrollment in Microsoft Intune. That enables organizations to require Linux devices to be compliant and enable users to be productive. Even on Linux devices. Besides that, it’s good to keep in mind that, at this point in time, it’s really only about device compliance. Configuring Linux devices is not part of the currently available functionalities. This post will describe the minor details about the …

Read more

Easily installing Progressive Web Apps

This week is not something completely new, but more something nice to be aware of. This week is all around Progressive Web Apps (PWAs) and easily and automatically installing them on Windows devices. The great thing about a PWAs is that they’re basically websites that are enhanced to function like installed, native apps on supporting platforms, while functioning like regular websites on other browsers. That provides a great cross-platform experience. On Windows devices, PWAs can actually be installed like a native app and in some ways even behave like native apps. That provides a really powerful experience. With Microsoft Edge basically any website can be installed as an app. The behavior depends on the capabilities of the website. A nice add-on to that is that the …

Read more

Getting started with Microsoft Defender Application Guard

This week is back to Windows. This week is all about Microsoft Defender Application Guard (Application Guard). Recently Application Guard functionality was added to Microsoft 365 apps for enterprise and those configuration options recently became available in Microsoft Intune. A good trigger for a new post. Application Guard uses hardware isolation to isolate untrusted sites and untrusted Office files, by running the application in an isolated Hyper-V container. That isolation makes sure that anything that happens within the isolated Hyper-V container is isolated from the host operating system. That provides an additional security layer. This post will start with a quick introduction about Application Guard, followed with the steps to configure Application Guard by using Microsoft Intune. Introduction to Microsoft Defender Application Guard Application Guard …

Read more