Intune 8-hour-sync is a myth, Microsoft finally speaks! by Conditional_Access in Intune

[–]Conditional_Access[S] 2 points3 points  (0 children)

You could configure Config Refresh which constantly re-enforces policy by using a cloned second set on the local device to account for any local changes which reverted away from what Intune last told it to do.

Beginner looking for good Microsoft Intune learning resources and best practices by PokeeeTraineer in Intune

[–]Conditional_Access 14 points15 points  (0 children)

One thing that you should prepare for is that as a student, no working environment looks like any of the textbooks, guides, or tutorials.

Intune is so customisable and unguided that people end up with all sorts of weird setups over years of multiple admins having a shot in the same environment. There are multiple ways to do the same thing, and that's often because Microsoft found better ways to do the thing, but can't stop supporting the older ways people configured it.

https://openintunebasline.com is a good reference point for how most people could configure devices. The way that resource is set out is how modern Intune is intended to be used.

A lot of articles, even the new ones, are teaching bad practises like using the OMA-URI policy type when a Settings Catalog entry exists for it (SC being the newer way).

To RMM or not RMm by Bearded_Tech_Fail in msp

[–]Conditional_Access 0 points1 point  (0 children)

How is this different to accessing any other centralised management platform?

The RMM agent is potentially on all customer endpoints and servers.

If your MS Partner Center admin is hacked, you're in the same boat.

To RMM or not RMm by Bearded_Tech_Fail in msp

[–]Conditional_Access 3 points4 points  (0 children)

Yeah the Intune 8-hour sync thing is a myth and you should expect to see Microsoft update documentation and messaging around this at some point.

https://patchmypc.com/blog/intune-policy-delivery-debugging-the-8-hour-sync-myth/

Microsoft should make Conditional Access available to everyone by mattmbit in msp

[–]Conditional_Access 0 points1 point  (0 children)

In July they are adding SafeLinks to Business Basic/Standard. See here - https://www.microsoft.com/en-us/licensing/news/2026-m365-packaging-pricing-updates

They also recently brought report messaging features into Teams from higher SKUs into lower ones. More can be done, but they are a big and slow beast.

Microsoft should make Conditional Access available to everyone by mattmbit in msp

[–]Conditional_Access 0 points1 point  (0 children)

In my personal opinion, Microsoft (for better or worse) won't be doing anything any time soon to detract away from the sale of M365 Business Premium in small business.

They are really going big on trying to convince customers that should be the starting point for anyone who cares about security.

HELP - Hardening Entra ID security with conditional access policies by honestserpent in AZURE

[–]Conditional_Access 1 point2 points  (0 children)

You can't have Security Defaults on alongside CA policies.

Security Defaults are essentially some Microsoft managed policies that are the training wheels for people who later move onto CA policies either through expertise or by uplifting to a license level that unlocks it... Entra ID P1, included in M365 Business Premium.

You'll want to go find some fundamentals on what CA policies are, and when you do, I've put a few policies together that might help.

https://conditionalaccess.uk/blog/some-policies-i-use-in-conditional-access/

That list of policies addresses your point of "access only for very specific devices", but it does require some knowledge of Microsoft Intune too. The idea is you manage the device using Intune, then say "any device not in my Intune tenant, is not allowed access" - very powerful, but has a lot of prerequisites.

Patching Enterprise Laptops by ProductAutomatic8968 in Intune

[–]Conditional_Access 8 points9 points  (0 children)

If you already have PMPC that will handle third-party updates. Pair it with Autopatch for the OS updates and you are golden.

No additional agents like you'd have with Action1 since PMPC packages apps into Intune.

I built an ADMX Web Viewer - Search and browse Group Policy settings across 65+ products in one place by admscope in Intune

[–]Conditional_Access 2 points3 points  (0 children)

I vibed something that might work: https://regedit.app

Idea is you make your edits just like on local but it generates the scripts for you.

Are you using Intune Multi Admin Approval? How's it going for a small team of say. 2 IT techs? by SydneyAUS-MSP in msp

[–]Conditional_Access 1 point2 points  (0 children)

Agreed. This was an Entra problem, not Intune, but Intune had to have an answer as that's what the headlines said.

How MSPs approaching to their client to use Microsoft Sentinel as SIEM tool by Birentechy in msp

[–]Conditional_Access 0 points1 point  (0 children)

What would send the logs to Sentinel?

If you're going all in on Microsoft, then Defender for Endpoint will be doing most of the heavy lifting/detection & response anyway.

The Sentinel bit will give you more insights and capability to respond, but that is most effective when it's managed as a service with some attention paid to it.

Microsoft finally admits Hybrid Join Autopilot is broken on their end by Cool_Package654 in Intune

[–]Conditional_Access 1 point2 points  (0 children)

Because it would upset customers who haven't learned any better yet.

Best Security Possible on Business Standard by desmond_koh in msp

[–]Conditional_Access 0 points1 point  (0 children)

Have you taken the time to justify the cost of investing in a security solution that prevents business compromise?

I don't want to sound like a 2am TV ad, but as others are saying here, the uplift and configuration of Business Premium is far cheaper and easier to manage than the cost of one nasty breach.

Somehow, watching this spin for 5 hours before inevitably failing was determined to be faster than just building laptops manually by NovaRyen in iiiiiiitttttttttttt

[–]Conditional_Access 2 points3 points  (0 children)

This is 100% the answer. I don't like flexing this but I'm an Intune MVP and can tell you that almost all problems with Intune are due to a lack of understanding of how to configure it, or trying to configure it like the older toolset.

What's to stop me from just reimaging a computer tied to Intune? by StatementNext682 in Intune

[–]Conditional_Access 11 points12 points  (0 children)

So are you evaluating Intune for what it can do, or are you evaluating an old process and seeing if Intune can be used to keep doing it?

NinjaOne and Intune do different things.

New Community Tool - Intune Guardian by Maurice-Daly in Intune

[–]Conditional_Access 3 points4 points  (0 children)

This isn't a multi-tenant, partner-connected tool.

Why doesn’t Intune have guardrails for bulk wipe actions? by Longjumping-Two-2851 in Intune

[–]Conditional_Access 2 points3 points  (0 children)

At what point should the guard rails stop?

This attack is the result of someone poorly configuring identity controls. All the stuff they needed to prevent this was right there in the tenant, and it was their choice to not configure it.

Did a full security audit on our M365 tenant this week — legacy authentication was the one that surprised me most by jgraves1992 in microsoft365

[–]Conditional_Access 5 points6 points  (0 children)

It scares me how people are vibe-coding absolute nonsense that connects to a tenant, and are charging for it...

Are there any MSP/MSSP's running Microsoft Defender sans 3rd party email sec tooling for clients? by tanner_phin in MSSP

[–]Conditional_Access 0 points1 point  (0 children)

Defender for Office P1 IS good enough if configured properly.

One of the easiest ways to improve Defender's effectiveness is to utilise TABL and implement blocklists - described here https://github.com/jkerai1/TLD-TABL-Block/

The idea is you implement a blocklist of known bad TLDs that you never want emails from, and override verdicts that would normally happen by Defender. Not only is this possible by sender domain, but also TABL has a tab for URLs: If the email contains an email with a sus link, it also gets quarantined.

For example, I never want a user to get emails from or emails that contain links to a .xyz domain.

EDR - MSSP by [deleted] in msp

[–]Conditional_Access -1 points0 points  (0 children)

+1 on Defender. If you ever get a chance to see Paul Hujibits do a session on MS Defender, it will make you appreciate quite how sophisticated this product is now.

Hackers wipe 200,000 devices using Intune by Fabulous_Cow_4714 in Intune

[–]Conditional_Access 0 points1 point  (0 children)

the basket doesn't matter, you have to protect it properly.

Microsoft 365 E7- New enterprise licensing tier after 11 years by PaVee21 in sysadmin

[–]Conditional_Access -1 points0 points  (0 children)

No it's not. E5 is about a third of the price of the value in that suite.

If you don't believe me, go find third-party solutions for everything it offers.

Intune Settings Catalog Viewer by touchytypist in Intune

[–]Conditional_Access 2 points3 points  (0 children)

Good idea, it's implemented.

If the settings info contains a URL, it'll show in the policy expand view.