How to Enable the “Clear Browsing Data on Exit” Option Using Microsoft Intune In this article, we’ll explore how to enable the “Clear Browsing Data on Exit” option using the Intune Settings Catalog. M...
With all of the Microsoft Intune projects I have been performing for clients of Safari Micro as of late, I wanted to make a quick post to outline the capabilities of Intune and how it can truly impact...
📱 Mastering Device Retirement in Microsoft Intune: A Complete Guide for IT Admins Managing devices in Microsoft Intune isn’t just about onboarding and configuration—it’s also about knowing when and ho...
Managing Allowed Folder Locations in File Explorer with Intune’s Settings Catalog Controlling folder access in File Explorer is essential for enhancing security, data protection, and user productivity...
Understanding High-Severity Threat Remediation in Intune In this article, we’re going to dive deep into how Microsoft Intune and Microsoft Defender Antivirus work together to contain high-severity thr...
MARCH IS DEVELOPMENTAL DISABILITIES AWARENESS MONTH!
Tune in to Action News 5 tomorrow at 4:00 pm to hear our very own Intunity executive director Earle Schwarz interviewed on "A Better Memphis" about...
Tired of Edge Deleting Your Saved Passwords? Here’s How Intune Fixes It Today, let’s talk about a common challenge: how to prevent Microsoft Edge from deleting saved passwords on exit using Intune. We...
A Critical Intune Hardening Policy That Blocks Local Credential Abuse Local accounts remain one of the most common entry points for attackers especially in environments where the same local administra...
Enable or Disable TLS 1.3 for EAP Client Authentication Using Intune Settings Catalog Policy The Settings Catalog in Microsoft Intune is one of the most efficient ways to configure and manage policies...
In today's world, keeping your digital devices secure is more important than ever. Microsoft Intune offers powerful tools to help manage security, even for devices not enrolled in Intune.
Microsoft Intune has announced an important network update as part of the Secure Future Initiative (SFI). Starting on or shortly after December 2, 2025, Intune traffic will begin routing through Azure...
How to Allow or Block Datagram Processing on Windows Server Using Intune Hey there! 👋 In this article, let’s dive into how to Allow or Block Datagram Processing on Windows Server using Microsoft Intun...
The "Audit Server Does Not Support Encryption" policy in Microsoft Intune is designed to help IT administrators identify legacy or vulnerable SMB servers that lack encryption support. When enabled, th...
In a corporate environment, you often find yourself working with several hundred devices every day. When you need to simultaneously update the GroupTAGs of different devices on Intune's Autopilot, unf...
Hardening Legacy Name Resolution: Securing NetBIOS Name Release via Intune In modern endpoint security, what we control silently often matters more than what we visibly block. While DNS dominates toda...
Deleting Undecryptable Passwords in Microsoft Edge with Intune In today’s workplace, password management is one of the most critical aspects of both security and productivity. Microsoft Edge, widely u...
Author: Aleksandr Zheleznov | Read Time: 13 minutes Microsoft Intune is a cloud-based endpoint management solution that enables organizations to manage end-user devices and the applications running on...
Managing Windows 11 shouldn't feel like guesswork. If your policies are behaving unpredictably, you aren't missing features, you're missing a mental model.
Author: Aleksandr Zheleznov | Read Time: 13 minutes Microsoft Intune is a cloud-based endpoint management solution that enables organizations to manage end-user devices and the applications running on...
BitLocker encryption is one of the easiest wins in endpoint security, but only if it’s enforced, monitored, and recoverable at scale. With Microsoft Intune, you can standardize and automate BitLocker ...