Guide to Intune App Protection Policies: Part 2 – Intune MAM

Overview Did you know that Microsoft Intune offers powerful capabilities for managing mobile apps through Intune App Configuration and Protection Policies? These policies are part of Intune’s Mobile Application Management (MAM) features, which allow IT-admins to secure and configure apps without requiring full device management. Intune MAM works alongside Intune MDM (Mobile Device Management), giving … Read more

How about them Conditional Access Policies! Part 3 – Advanced policies

This blog is about advanced Conditional Access policies, like Risk-based, Device-based, app-based and more admin related policies. End users need additional licenses for some of these policies, such as Entra ID P2, which is included in M365 E5 or the E5 security add-on. This blog post also assumes that organizations ambition is to require compliant … Read more

How about them Conditional Access Policies! Part 2 – Policies that everyone needs

This blog is about recommended Conditional Access Policies and how to build them. First my 6 points on Conditional Access Policy building principles: Blog series overview How about them Conditional Access Policies! Part 1 – Naming convention – Wallo BlogHow about them Conditional Access Policies! Part 2 – Policies that everyone needs – Wallo BlogHow … Read more

How about them Conditional Access Policies! Part 1 – Naming convention

Here we go again, starting with Conditional Access naming convention! First of all, what is conditional access policies (CA policies)? I hate reinventing things that are already invented, so from Microsoft: “Modern security extends beyond an organization’s network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access … Read more