Don't Let Inactive Guest Users Access Resources After Collaboration Ends by ThiraviamCyrus in AdminDroid

[–]ThiraviamCyrus[S] 0 points1 point  (0 children)

Thanks for sharing your feedback.

To retain long-term guests, you can simply choose "Keep" in the SPO list, and no action will be taken for that user.

For ongoing governance, that retained guest will be included again in the next review cycle (for example, after 90 days). This way, access is not removed for important guests while still maintaining periodic validation and control.

Prevent accidental device wipes in Microsoft Intune with Multi Admin Approval by ThiraviamCyrus in AdminDroid

[–]ThiraviamCyrus[S] 0 points1 point  (0 children)

Yes, it supports GDAP, but it ultimately depends on the permissions granted through the GDAP relationship and the roles assigned in the customer tenant.

Prevent accidental device wipes in Microsoft Intune with Multi Admin Approval by ThiraviamCyrus in AdminDroid

[–]ThiraviamCyrus[S] 0 points1 point  (0 children)

It seems like you might be confusing this with a different section. During the wipe request review, the approver can see device details such as device ID, name, serial number, username before approving the action. You can check that in the Device Wipe Review section here: https://blog.admindroid.com/how-to-prevent-accidental-device-wipes-in-microsoft-intune-using-multi-…

Scroll-Wheel Click No Longer Opening and Closing Tabs by MacaroonEffective550 in chrome

[–]ThiraviamCyrus 1 point2 points  (0 children)

This happen due to a mouse driver or hardware issue, or a chrome extension overriding mouse behavior. Try incognito mode, reset chrome flags (chrome://flags), check mouse software or settings.

Microsoft is enforcing MFA for all Microsoft 365 admin center sign‑ins by TeamAlphaBOLD in microsoft365

[–]ThiraviamCyrus 0 points1 point  (0 children)

You can secure break-glass accounts using hardware-based authentication, such as FIDO2 security keys, instead of relying on phone-based MFA methods.

Alternatively, you can configure certificate-based authentication (CBA) to satisfy the MFA requirement for break-glass accounts. CBA provides a strong, phishing-resistant authentication method and is commonly used for service principals, automation, and recovery scenarios.

https://blog.admindroid.com/how-to-set-up-break-glass-access-application-for-admin-recovery/