There are several ways to deploy applications to users or devices that are managed by Microsoft Intune. In addition to application types, you must also take into consideration the method of assignment and how it will affect you long term from a management and maintenance standpoint. Deploying an application installer via Intune is usually accomplished […]
In my previous blog [Win32 App Deployment with Intune Supersedence Rules] I explained how to update Win32 applications deployed within Microsoft Intune by using the supersedence feature. Although the process is typically straightforward and simple, the requirement of keeping a security group populated with all user or device objects can make the task time-consuming. This
[WEBINAR] Panel: Defending Hybrid Identity Environments Against Cyberattacks In this webinar, leading experts from the identity security space, including Brian Desmond from Ravenswood Technology Group, share their insight and experience helping real-world organizations secure hybrid environments, which are prime targets for increasingly common cyberattacks that compromise on-premises systems, then move to the cloud—or vice versa.