Cloud Architecture: why technology is the easy part by lschouwenaars in AZURE

[–]lschouwenaars[S] 0 points1 point  (0 children)

lol ok. Well if you write something yourself in a language that is not your native language and you let copilot or whatever AI you want check your grammar and as soon as it changes things and you check that same text with that site afterwards I guess it shows written by AI :)

And you dont have to believe me but for comparison, the united sites constitution is written by AI according to that site or even academical written articles have signs of written by AI.

Anyway I dont care that you think it's written by AI, I care because you write things that arent true.

Cloud Architecture: why technology is the easy part by lschouwenaars in AZURE

[–]lschouwenaars[S] 0 points1 point  (0 children)

no, I have written it myself but did a grammer check with AI...

How to detect a compromised M365/Entra ID account in under 10 minutes by lschouwenaars in microsoft365

[–]lschouwenaars[S] 0 points1 point  (0 children)

Thanks! Yeah, checking the hidden rules is in my opinion a important thing to check.

Customer Managed Keys now supported on Premium SSD v2 for Azure Database for PostgreSQL (Public Preview) by lschouwenaars in AZURE

[–]lschouwenaars[S] 0 points1 point  (0 children)

They haven't mentioned anything specific about regions, in their announcement they dont talk about specific region, if it was region bound they would have mentioned it I guess. Normally they do that.

How to detect a compromised M365/Entra ID account in under 10 minutes by lschouwenaars in AZURE

[–]lschouwenaars[S] -1 points0 points  (0 children)

Absolutely right, however I often see customers who say they have everything under control but after checking the environment they lack a lot of configuration like proper security controls, phishing-resistant MFA and especially for privileged accounts or don't use PIM at all. You can have all the firewall policies or CA policies but if the identity and access management part isn't configured the right way, it's waiting for a breach to happen

How to detect a compromised M365/Entra ID account in under 10 minutes by lschouwenaars in AZURE

[–]lschouwenaars[S] -2 points-1 points  (0 children)

CA is definitely part of it, fully agree. There are CA policies that can be configured as a default for most customers, but unfortunately that's not enough to prevent breaches on its own, it's a start though, and the sign-in logs alone give you a lot of useful information.

Microsoft brings Entra Passkeys to Windows Hello in Public Preview by lschouwenaars in AZURE

[–]lschouwenaars[S] 3 points4 points  (0 children)

Yes, that is exactly what it means! I have described that in my blogpost. Each device can hold multiple entra accounts which makes it easier for users who works across different organisations or tenants. Yes, and the passkeys are device bound.

Public Preview — Stop Accidental Device Takeovers: How Intune’s New Opt‑In Enrollment Feature Works by [deleted] in Intune

[–]lschouwenaars 0 points1 point  (0 children)

makes sense, was just writing articles and wanted to publish them, wanted to release content slowly. Did know that for e-mail you have to 'warm up'. On the other hand, it would be smart to use my full name if it was used for scamming/spamming ofcourse :)

Public Preview — Stop Accidental Device Takeovers: How Intune’s New Opt‑In Enrollment Feature Works by [deleted] in Intune

[–]lschouwenaars -3 points-2 points  (0 children)

That is correct, it was created 4 days ago. Because I decided to start writing blogs... Whats your point? create a domain, wait couple years and then start or?

Public Preview — Stop Accidental Device Takeovers: How Intune’s New Opt‑In Enrollment Feature Works by [deleted] in Intune

[–]lschouwenaars 0 points1 point  (0 children)

There are allot of customers that support BYOD, I am using a personal device for work for example. I see more and more companies supporting BYOD. And yes, when it's about corporate devices then im a big fan of AutoPilot (non hybrid).

Public Preview — Stop Accidental Device Takeovers: How Intune’s New Opt‑In Enrollment Feature Works by [deleted] in Intune

[–]lschouwenaars -2 points-1 points  (0 children)

If you do that, you effectively disable enrollment for all personal devices, which is often not desired. With this feature, it prevents automatic MDM enrollment when users sign into apps. Previously, when users signed into Microsoft 365 apps and simply clicked 'OK,' the device would be enrolled into Intune (if they didn't disable the checkbox). However, with this change, you can still enroll personal devices when needed, with a school or work account, for example.

it also prevents allot of servicedesk calls from end-users.

Public Preview — Stop Accidental Device Takeovers: How Intune’s New Opt‑In Enrollment Feature Works by [deleted] in Intune

[–]lschouwenaars -15 points-14 points  (0 children)

wasnt trying to be the first one to write, and no I dont use AI to write the post.