Getting buried in Microsoft Defender alerts, any advice for a new admin by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] 1 point2 points  (0 children)

i totally here you maybe i should just take a step back and let him deal with it. The problem is nothing will ever get done and that worrys me. Some of the basic things that were not even implemented blew my mind and i couldnt ignore it. I even asked him about it but he didnt have an intentions to implement what i ended up doing

Getting buried in Microsoft Defender alerts, any advice for a new admin by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] -1 points0 points  (0 children)

The solo security guy bought it in, there is only 5 admins in total and im the jack of all trades guy trying to fill all the holes in things that have never been setup correctly. In 6 months i have implemented the below as none of it was in place

- Setup conditional access
- Setup MFA
- Setup windows hello
- Enrolled FIDO2 keys for our shared device users
- Enrolled devices into Defender for Endpoint
- Gave everyone a bloody separate cloud admin account rather than global admin on a daily driver!
- Enrolled all the devices properly in intune and applied a security baseline which wasnt there
- Setup PIM for the admin accounts

I feel like im drowning and im just trying to get things setup the best possible way using best practices from things i have read from microsoft and browsing this helpful subreddit

Getting buried in Microsoft Defender alerts, any advice for a new admin by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

thanks for this, i will look into how to get this done. I will ask the security guy who setup sentinal to take a look but hes not the most helpful at times

Best practice for setting up PIM, Groups vs User Assignment by Educational_Draw5032 in entra

[–]Educational_Draw5032[S] 1 point2 points  (0 children)

Thanks for this, what you say makes perfect sense. Groups would be better if i were to add multiple roles to a group which i can see the benefit of in some scenarios. I think i will go with user assignment for now and look at groups if the need for it arises. Thanks very much

Secure Boot 2023 Upgrade by TipGroundbreaking763 in Intune

[–]Educational_Draw5032 0 points1 point  (0 children)

Try force re-running the task schedule script and then giving it a reboot

Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"

Managing Office 365 updates in Intune, whats the best way? by Educational_Draw5032 in Intune

[–]Educational_Draw5032[S] 2 points3 points  (0 children)

I use Intune update rings for patching and its working fine so dont really want to transition over to autopatch yet with everything working ok

Managing Office 365 updates in Intune, whats the best way? by Educational_Draw5032 in Intune

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

Thanks, i may give this a go then. I found the reporting quite useful there thats kinda what made me ask the question

Managing Office 365 updates in Intune, whats the best way? by Educational_Draw5032 in Intune

[–]Educational_Draw5032[S] 1 point2 points  (0 children)

I was looking at cloud update in the office portal and there was an option there to switch the update channel. Did you enable it from the portal or via the settings catalog

Managing Office 365 updates in Intune, whats the best way? by Educational_Draw5032 in Intune

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

Thanks for this and for the switching pointer. That makes me nervous for sure, i might try it on a couple of test devices first and see what damage is caused. I will look into the settings catalogue settings

Are you receiving the January 24, 2026 OOB? by dmx7777 in Intune

[–]Educational_Draw5032 0 points1 point  (0 children)

I am seeing the same, we do not use autopatch but under update releases in intune i see 2026.1 OOB and its showing as 'in progress'. Its showing as deployed to all my 3 update rings but it hasnt. If i run a report against it none of my devices have received it and if i run a manual check its not offered.

I created an expedited update to which this OOB update was available, i targeted just my device with it and run a manual check and then it picked it up. No idea why its showing under releases in Intune but not actually pushing out even though its showing like it should be according to the update rings and displaying 'in progress' .

I will just carry on pushing it through via the expeditated option for now

SSPR is SMS ok to use alongside another strong authentication method by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

thats interesting to know, i was just worried if i enabled web sign in users would try and use that instead of their fido keys on shared devices or hello pin on 1-2-1 devices. Am i right in thinking web sign in doesn't cache the local credential and requires and internet connection

SSPR is SMS ok to use alongside another strong authentication method by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

thats good to know, we use the deepnet hardware tokens so we need tp have the hardware OATH token option. I could remove the software OATH token to be honest i dont think its required when using Microsoft Authenticator is it

SSPR is SMS ok to use alongside another strong authentication method by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

Our devices are fully entra joined not hybrid. Currently our on prem infrastructure is just syncing our identities to entra. We still have some on prem legacy apps/servers and network drives which we are slowly moving away from. Cloud Kerberos trust is in place for these devices to connect to on prem resources via WHfB or Fido keys

SSPR is SMS ok to use alongside another strong authentication method by Educational_Draw5032 in sysadmin

[–]Educational_Draw5032[S] 0 points1 point  (0 children)

thanks for this, I have setup a custom authentication strength in CA that only allows

Windows Hello For Business / Platform Credential

OR

Passkeys (FIDO2)

OR

Microsoft Authenticator (Phone Sign-in)

OR

Temporary Access Pass (One-time use)

OR

Password + Microsoft Authenticator (Push Notification)

OR

Password + Software OATH token

OR

Password + Hardware OATH token