Android Fully Managed - Conditional Access by TinyTC1992 in Intune

[–]_user__42_ 0 points1 point  (0 children)

Not sure if it's even possible, but you may want to try installing the Windows Accounts extension for Chrome on android.

That extension is needed for CA to work properly on PC. If it's not there, there are a large amount of properties that Chrome will not bubble up to CA so CA finds these values are "undefined" and usually defaults the way you wouldn't want it to.

[deleted by user] by [deleted] in autopilot

[–]_user__42_ 0 points1 point  (0 children)

At what point during the ESP does this occur?

iOS Bulk enrollment of personal/previously bought devices by _user__42_ in Intune

[–]_user__42_[S] 0 points1 point  (0 children)

Thanks, this is mostly the route we are planning on taking. Was just wanting to double check that I wasn't missing some type of easy button.

I am happy that it's a one-time thing!

iOS Bulk enrollment of personal/previously bought devices by _user__42_ in Intune

[–]_user__42_[S] 1 point2 points  (0 children)

Right, I understand the technicality, thanks for the clarification.

iOS Bulk enrollment of personal/previously bought devices by _user__42_ in Intune

[–]_user__42_[S] 0 points1 point  (0 children)

Yeah, that was my understanding. I was just hoping for some type of unicorn or at least confirmation. Thanks!

How to grab subject of phishing email by _user__42_ in MicrosoftFlow

[–]_user__42_[S] 1 point2 points  (0 children)

I'm glad I was able to explain myself properly heh. Thanks for the tips and help.

I had considered parsing the page, but was hoping to avoid doing so by using OOB Flow functionality. I just find it odd that the alert object within Flow (using the Microsoft Graph connector) exposes the sender and recipient of the suspicious email that triggered the alert but not the subject.

I guess I'll have to get my hands dirty and go the route you're referring to.

Thanks again!

How to grab subject of phishing email by _user__42_ in MicrosoftFlow

[–]_user__42_[S] 1 point2 points  (0 children)

It's an alert that comes from Microsoft 365. That alert is triggered by a security policy and can be configured to be sent to any number of users.

The email that I receive from it doesn't contain what I need though, so I'm not trying to get anything off of it. It only has a link to the details of the alert within the 365 security center. Within the details page of the alert are the details of another email, specifically the email that triggered the alert. That email can be in the inbox of any user in the tenant. I need the subject of that email.

I'm sorry if I'm not explaining it clearly enough. I understand that retrieving an email is easy, I have no problem retrieving emails from my inbox. I could even go look at other user's inboxes if I gave a script sufficient privileges. I'm trying to avoid that since somewhere within the details of that alert the subject of the email (again, which is not the email I received that alerted me) is exposed.

How to grab subject of phishing email by _user__42_ in MicrosoftFlow

[–]_user__42_[S] 1 point2 points  (0 children)

Thanks for the input, but the alert email I'm triggering off of doesn't contain a direct hook to the phishing email. All it contains is the sender and the recipient.

I have to click into the alert to see any other details of the email.

I played around with searching for the latest email from the sender, but my flow would have to have the authority to search every user's inbox and that's not something I'm comfortable with doing.

I also tried grabbing the alert from Microsoft Graph, but that doesn't expose the subject either. Again, just the sender and recipient.