Author: Chamara Priyadarshana

  • AirWatch Cloud Connector

    ACC can connect to internal Certificate Authority. Bind user need read permission. If you only want AD sync then Access…

    Read More

  • How to Demote a Domain Controller: A Step-by-Step Guide

    Demoting a domain controller is a critical task that should be performed carefully to ensure that it does not negatively…

    Read More

  • MDT

    You should add only the drivers that are necessary to the boot image & can control which drivers are added…

    Read More

  • Intune Points

    Azure log analytic workspace collect data from end devices’ Microsoft monitoring agent. MDT – Microsoft Deployment Toolkit Intune supply settings…

    Read More

  • Azure AD Registered vs Joined

    Registered Personal Devices: Typically used for personal devices such as mobile phones, tablets, and personal computers. Bring Your Own Device…

    Read More

  • SharePoint Library : Block Download

    Ceate a new Permission Levels from site, Remove “Open Items” permission from new role, Just gave below Site Permissions,

    Read More

  • Block Domains & Addresses

    In here, we are going to use Anti-Spam policy. https://security.microsoft.com/tenantAllowBlockList

    Read More

  • VMware Workspace ONE

    VMware Workspace ONE is a platform designed to help businesses manage and secure the apps and devices used by their…

    Read More

  • Data Loss Prevention

    Prevent the unauthorized exposure of sensitive information. Identify and monitor sensitive items across below platforms, For Microsoft 365 Business Standard…

    Read More

  • WorkspaceONE – Windows 10

    Basic accounts : created locally in the Workspace ONE UEM admin console, as opposed to the accounts which are imported…

    Read More