![Paddy Maddy](/img/default-banner.jpg)
- 1 025
- 3 951 677
Paddy Maddy
India
Приєднався 17 гру 2014
azure tutorial for beginners
#paddyMaddy #azuretutorial #azuretraining #intune
azure training
Complete Azure training
Complete SCCM training
Compute Intune training
Microsoft azure training
azure tutorial for beginners
#SCCM #ConfigMgr #Windows10 #Intune #EMS #Mobile #DeviceManagement
#AZUREAD
#AZURE
#AWS
#CLOUD
Microsoft SCCM Guides
SCCM Install Guide
SCCM Step By Step Guide
SCCM Current Branch Install
#Microsoft SCCM Guides
#Installing Microsoft SCCM
#Installing SCCM
#Install SCCM
#SCCM Install Guide
#SCCM Step By Step Guide
#SCCM Current Branch Install
#SCCM Prerequisites
#SCCM Install Prerequisites
#intune
#msintune
Azure Training in Telugu lo
Cloud Deployment, #PaddyMaddy, cloud Computing,azure tutorial,microsoft azure tutorial for beginners,azure for beginners,azure basics,microsoft azure training
Microsoft,Intune,Training,Azure,SCCM,AutoPilot,ConfigMgr,Windows,Cloud,MEM,MSIntune,MEMIntune
www.paddymaddy.com/
#paddyMaddy #azuretutorial #azuretraining #intune
azure training
Complete Azure training
Complete SCCM training
Compute Intune training
Microsoft azure training
azure tutorial for beginners
#SCCM #ConfigMgr #Windows10 #Intune #EMS #Mobile #DeviceManagement
#AZUREAD
#AZURE
#AWS
#CLOUD
Microsoft SCCM Guides
SCCM Install Guide
SCCM Step By Step Guide
SCCM Current Branch Install
#Microsoft SCCM Guides
#Installing Microsoft SCCM
#Installing SCCM
#Install SCCM
#SCCM Install Guide
#SCCM Step By Step Guide
#SCCM Current Branch Install
#SCCM Prerequisites
#SCCM Install Prerequisites
#intune
#msintune
Azure Training in Telugu lo
Cloud Deployment, #PaddyMaddy, cloud Computing,azure tutorial,microsoft azure tutorial for beginners,azure for beginners,azure basics,microsoft azure training
Microsoft,Intune,Training,Azure,SCCM,AutoPilot,ConfigMgr,Windows,Cloud,MEM,MSIntune,MEMIntune
www.paddymaddy.com/
Control USB Access with Microsoft Intune and Defender for Endpoint Step by Step to Block or Allow
📢 Control USB Access with Microsoft Intune and Defender for Endpoint | Step-by-Step Guide to Block or Allow USB Drives
Welcome to my channel! This comprehensive tutorial will walk you through the process of controlling USB access using Microsoft Intune and Defender for Endpoint. Whether you want to block or allow USB drives, this step-by-step guide will help you effectively manage your organization's device security.
🔍 In this video, you'll learn:
Introduction to Microsoft Intune and Defender for Endpoint
How to configure Intune policies to manage USB drive access
Step-by-step instructions to block USB drives
How to allow USB drives for specific users or devices
Best practices for managing device security in your organization
🚀 Why control USB access?
Controlling USB access is crucial for protecting sensitive data and preventing unauthorized data transfers. By using Microsoft Intune and Defender for Endpoint, you can ensure your organization maintains a high level of security and compliance.
🔧 Tools you'll need:
Microsoft Intune
Microsoft Defender for Endpoint
📌 Chapters:
0:00 Introduction
0:20 Prerequisites: Microsoft Defender Plan License
1:16 Configuring the Policy: Endpoint Security and Attack Surface Reduction (ASR)
2:10 Creating a New Policy for Windows 10 or Later
3:08 Device Controller Configuration for Removable Media Control
3:45 Blocking USB Drives: Step-by-Step
5:00 Advanced Blocking Options and Driver Control
6:00 Specific Permissions: Read, Write, Execute
7:00 Assignment to Target Groups and Finalizing the Policy
7:36 Conclusion and Best Practices
💬 Have questions or need help? Drop a comment below, and we'll be happy to assist you!
👍 If you found this video helpful, please like, subscribe, and share it with others who might benefit. Don't forget to hit the bell icon to stay updated with our latest videos!
Join PaddyMaddy channel to get access to perks:
👉 ua-cam.com/channels/lNOBXkearuQ3lPgmHmpBDw.htmljoin
#PaddyMaddy #Intune #DefenderForEndpoint #USBSecurity #DeviceManagement #CyberSecurity #TechTutorial
Welcome to my channel! This comprehensive tutorial will walk you through the process of controlling USB access using Microsoft Intune and Defender for Endpoint. Whether you want to block or allow USB drives, this step-by-step guide will help you effectively manage your organization's device security.
🔍 In this video, you'll learn:
Introduction to Microsoft Intune and Defender for Endpoint
How to configure Intune policies to manage USB drive access
Step-by-step instructions to block USB drives
How to allow USB drives for specific users or devices
Best practices for managing device security in your organization
🚀 Why control USB access?
Controlling USB access is crucial for protecting sensitive data and preventing unauthorized data transfers. By using Microsoft Intune and Defender for Endpoint, you can ensure your organization maintains a high level of security and compliance.
🔧 Tools you'll need:
Microsoft Intune
Microsoft Defender for Endpoint
📌 Chapters:
0:00 Introduction
0:20 Prerequisites: Microsoft Defender Plan License
1:16 Configuring the Policy: Endpoint Security and Attack Surface Reduction (ASR)
2:10 Creating a New Policy for Windows 10 or Later
3:08 Device Controller Configuration for Removable Media Control
3:45 Blocking USB Drives: Step-by-Step
5:00 Advanced Blocking Options and Driver Control
6:00 Specific Permissions: Read, Write, Execute
7:00 Assignment to Target Groups and Finalizing the Policy
7:36 Conclusion and Best Practices
💬 Have questions or need help? Drop a comment below, and we'll be happy to assist you!
👍 If you found this video helpful, please like, subscribe, and share it with others who might benefit. Don't forget to hit the bell icon to stay updated with our latest videos!
Join PaddyMaddy channel to get access to perks:
👉 ua-cam.com/channels/lNOBXkearuQ3lPgmHmpBDw.htmljoin
#PaddyMaddy #Intune #DefenderForEndpoint #USBSecurity #DeviceManagement #CyberSecurity #TechTutorial
Переглядів: 297
Відео
Configure Windows LAPS with Microsoft Intune: A Step-by-Step Guide
Переглядів 456День тому
Manage Windows LAPS policy with Microsoft Intune How to Set Up Windows LAPS with Microsoft Intune Set up Windows LAPS with Intune: A Step-by-Step Guide Step-by-Step Guide: Enabling Windows LAPS in Entra ID Manage Windows LAPS from Intune Configure Windows LAPS in Intune Windows LAPS and Intune Windows LAPS Management using Microsoft Intune Deploy Cloud-Based Windows LAPS to Windows Endpoints St...
Step-by-Step Guide: How to Create a Free Azure Subscription or Pay-As-You-Go Model
Переглядів 24114 днів тому
Welcome to our comprehensive guide on how to create a free Azure subscription or opt for the pay-as-you-go model. In this video, we will walk you through the entire process, from opening your browser to verifying your account details. Whether you're looking to explore Azure's free services or ready to pay as you go, this tutorial has you covered. By the end of this video, you'll have a clear un...
Introduction to Microsoft Entra: Exploring the Multicloud Identity and Access Solutions
Переглядів 22721 день тому
Introduction to Microsoft Entra: Exploring the Multicloud Identity and Access Solutions
Microsoft Entra: Understanding the New Name for Azure Active Directory
Переглядів 19921 день тому
Microsoft Entra: Understanding the New Name for Azure Active Directory
Azure Active Directory is Now Microsoft Entra! - What You Need to Know (2024 Update)
Переглядів 26221 день тому
Azure Active Directory is Now Microsoft Entra! - What You Need to Know (2024 Update)
Microsoft Entra ID Device Join Types Entra Registered vs Entra Joined vs Entra Hybrid join
Переглядів 34128 днів тому
Microsoft Entra ID Device Join Types Entra Registered vs Entra Joined vs Entra Hybrid join
Enroll Configuration Manager Devices into Endpoint Analytics
Переглядів 3373 місяці тому
Enroll Configuration Manager Devices into Endpoint Analytics
Enroll Intune Devices into Endpoint Analytics
Переглядів 2663 місяці тому
Enroll Intune Devices into Endpoint Analytics
Enroll Intune and Configuration Manager devices into Endpoint analytics
Переглядів 1533 місяці тому
Enroll Intune and Configuration Manager devices into Endpoint analytics
Microsoft Endpoint Analytics Understand Endpoint Analytics Scores, Baselines, and Insights
Переглядів 1954 місяці тому
Microsoft Endpoint Analytics Understand Endpoint Analytics Scores, Baselines, and Insights
Your Endpoint Analytics Deep Dive: A Comprehensive Overview (Intune & SCCM)
Переглядів 3054 місяці тому
Your Endpoint Analytics Deep Dive: A Comprehensive Overview (Intune & SCCM)
Microsoft Intune License Options | Microsoft Intune Plans and Pricing
Переглядів 1,6 тис.4 місяці тому
Microsoft Intune License Options | Microsoft Intune Plans and Pricing
Mastering Microsoft Configuration Manager (SCCM): 2023 Client Push Deployment Tutorial
Переглядів 2 тис.8 місяців тому
Mastering Microsoft Configuration Manager (SCCM): 2023 Client Push Deployment Tutorial
Step-by-Step Guide: Microsoft Configuration Manager Client Installation [2023]
Переглядів 2,8 тис.8 місяців тому
Step-by-Step Guide: Microsoft Configuration Manager Client Installation [2023]
Configuring 👉Microsoft Configuration Manager Boundaries, Groups And Discovery Methods 🔍
Переглядів 8989 місяців тому
Configuring 👉Microsoft Configuration Manager Boundaries, Groups And Discovery Methods 🔍
Configuration Manager Hierarchy Site Design and Scale Numbers Explained
Переглядів 6839 місяців тому
Configuration Manager Hierarchy Site Design and Scale Numbers Explained
How do I notify Azure Active Directory users when password is about to expire?
Переглядів 6 тис.9 місяців тому
How do I notify Azure Active Directory users when password is about to expire?
Step-by-Step Guide: Creating a Microsoft Active Directory Domain Controller
Переглядів 2,7 тис.9 місяців тому
Step-by-Step Guide: Creating a Microsoft Active Directory Domain Controller
Installing Prerequisites for Configuration Manager Step by Step
Переглядів 2,6 тис.9 місяців тому
Installing Prerequisites for Configuration Manager Step by Step
Exploring MSCM Site Types Understanding Hierarchy and Site Types Functionality
Переглядів 6779 місяців тому
Exploring MSCM Site Types Understanding Hierarchy and Site Types Functionality
How to Block Microsoft Office 365 Attachments on Personal Devices | Cloud App Security Tutorial
Переглядів 2,1 тис.11 місяців тому
How to Block Microsoft Office 365 Attachments on Personal Devices | Cloud App Security Tutorial
Microsoft Intune Zero Trust Security Model
Переглядів 783Рік тому
Microsoft Intune Zero Trust Security Model
Revolutionize Your IT Support with Remote Help in Microsoft Intune
Переглядів 1,6 тис.Рік тому
Revolutionize Your IT Support with Remote Help in Microsoft Intune
Deploying Company Portal Application using Microsoft Intune: Complete Demo
Переглядів 11 тис.Рік тому
Deploying Company Portal Application using Microsoft Intune: Complete Demo
Step-by-Step Guide: How to Configure and Take Remote Control with Microsoft Intune Remote Help
Переглядів 6 тис.Рік тому
Step-by-Step Guide: How to Configure and Take Remote Control with Microsoft Intune Remote Help
Display Lock Screen Message for iOS Devices with Intune
Переглядів 1,8 тис.Рік тому
Display Lock Screen Message for iOS Devices with Intune
Intune Multiple Admin Approval (MAA) overview with short demo
Переглядів 525Рік тому
Intune Multiple Admin Approval (MAA) overview with short demo
how to unionstall edge browser on android device. we deployed edge browser through android apps. Is it possible pls let me know
Hi @srich9382, thank you for reaching out. Unfortunately, as of now, Microsoft Edge browser is not officially supported on Android devices. It may be possible to install it through unofficial means, but we recommend using browsers that are specifically optimized for Android devices to ensure a smooth browsing experience. If you have any other questions or concerns, feel free to ask. Thank you.
@@PaddyMaddy26 I want to expert intune. i want to join a course online. pls let me know when will u start the calls. not udemy.
Paddy Maddy, really helpful, thanks for the effort you put in.
Thank you for your kind words, I'm glad to hear that you found the content helpful. I appreciate your recognition of the effort I put into creating these videos. If you have any more questions or topics you'd like me to cover, feel free to let me know. Thank you for watching!
Thank you❤
Hi Mohammadkarvani6913, thank you so much for your kind words and support! ❤️ I appreciate you taking the time to leave a comment. If you have any questions or need any further assistance, feel free to reach out. Have a great day!
@@PaddyMaddy26I have no questions at the moment. Thankful
When you any questions please post as a new comment you will get a response within 10 minutes round the clock… it’s my SLA to respond to all new comments…Thank you
Sir please Can you make videos on Azure DevOPS Azure Kubernetes With practical examples I’m in a very problematic situation in my project, I joined my company as an Azure Engineer but since the project was already completed so we are just in the project to support and do some minor changes. The market demands for Azure DevOPS, IAAC, Kubernetes. Since this current project does not offer any such thing I’m just stuck here and looking forward for some easy tutorials on these topics. Your videos have helped me in cracking interviews when I had almost 0 exp in azure, so it’s a humble request to you to cover on these topics. It will be really helpful to people like us who are stuck in support projects and want to move to development and migration projects.
Hello Jello_o, Thank you for your suggestion. I will definitely consider creating videos on Azure DevOps and Azure Kubernetes with practical examples in the future. Stay tuned for more content on these topics! Best regards, Paddymaddy
@@PaddyMaddy26Thank you so much sir
Hi bro DP 900 CERTIFICATE CHEYYALLI CAN U HELP ME THAT WHICH LINK I HAVE TO USED
Hi Reddy Garu, What help you need ?
Hi sir i need personal training fast track. Is any classes will start soon?
I am not teaching online .. I have posted in UA-cam and Udemy
Hi. thank you for the great video. Is it possible to hire you to help us with the Azure Virtual Desktop?
You can book a FREE consulting slot to understand your requirements from my calendar paddymaddy.setmore.com/paddymaddy
Hi Aniyahudi, thank you for watching the video and for your interest in our services. We would be happy to discuss the possibility of working with you to help with Azure Virtual Desktop. Please feel free to reach out to us via paddymaddy.setmore.com/paddymaddy to discuss further details and potential collaboration. Thank you!
Such a informative video for beginners. Nice One.
Thank you for your positive feedback! I'm glad you found the video informative for beginners. Please let me know if you have any questions or if there is anything else you would like to learn about.
It worked😀 🙌🏻…Thank you so much for taking your time to make this video. I really appreciate your efforts👍🏻. Currently it is working as expected with blocking only usb drive and allowing mouse/keyboards, i will try to add exclusion for some particular devices then will see how it behave.
Thank you for your feedback, TechNerd202! I'm glad to hear that the video was helpful and that the solution is working as expected for you. Good luck with adding exclusions for specific devices and feel free to reach out if you have any further questions. Your support and appreciation mean a lot to me. Thank you! 👍🏻
Your contents are solid & commercially useful.
Thank you so much for your kind words! I'm glad to hear that you find my content valuable and commercially useful. It's always motivating to receive positive feedback like yours. I appreciate you taking the time to leave a comment. If you have any suggestions for future content or topics you'd like to see covered, feel free to let me know. Thanks again for your support!
I just whittled down to 2 words after watching this video : "Thank you!"
Thank you for your kind words! I'm glad you enjoyed the video. If you have any suggestions for future content, feel free to let me know.
Too long of a titles makes me not want to watch the video change that man
Thank you for your feedback, we appreciate your input. We will take your suggestion into consideration for future videos. Thank you for watching and for your support.
Hi Pavan, thanks for the video 👍, i have a question not related to this topic, could not find your playlist so i am posting it here. I want to block USB access for windows devices either from Intune or Defender for Endpoint but allow the basic USB devices like Mouse and Keyboards to work. I have tried creating policy from Configuration Profile (Administrative Template) and from Device Control (ASR) but nothing seems to work the way it should be. As per the MS documents it is simple but in practical it is not working. Either it is blocking all USB or Allowing all. I have gone through many youtube video but could not find a easy and best way which work. Have you tried this scenario and did it work, if not then could you add this to your list as it will be very helpful for others as well, since this is the basic requirement of every organization which is using Defender for Endpoint but achieving the desired result seems quite difficult.
Hi there! Thank you for reaching out and sharing your experience with trying to block USB access for Windows devices. I understand how frustrating it can be when the functionality doesn't work as expected, despite following the official documentation. I haven't personally tried this specific scenario myself, but I can definitely look into it further and see if I can provide any helpful tips or solutions. It's important to find a way to achieve the desired result, especially for organizations using Defender for Endpoint. I appreciate your suggestion to add this topic to my list for future videos, as it could certainly benefit others facing similar challenges. Thank you for bringing this to my attention, and I'll do my best to assist in any way I can. Feel free to let me know if you have any specific questions or details that may help me better understand the issue you're facing. Thank you!
@@PaddyMaddy26 thanks 🙂
Do you need to block all or allow all based on Security groups ?… if this is required I can make a video as I have done this many times… But what’s challenging is a specific to a usb white list is not working these are in preview at this time
@@PaddyMaddy26 currently the requirement is to block usb access to all users but keyboard/mouse should work. If possible then we can have a exclusion group to give permission to particular user or department. We dont have a requirement to whitelist any usb device. Only thing is mouse and keyboard should work. We have both ME3 and ME5 licens
@user-mi4qq1sh2m it’s a easy one.. give me few hours to share a video it’s Saturday I can make a video for you..
Can I have these slides We will pay for that These are large videos Takes more time to complete If the PPT are in handy ...we can access easily
Hello @mallicse568, thank you for your interest in our slides. Unfortunately, we do not offer them for purchase at this time. However, we appreciate your offer to pay for them and will take it into consideration for future offerings. Thank you for understanding.
Great video
Thank you so much for your kind words! I'm glad you enjoyed the video. If you have any suggestions for future content, feel free to let me know. Thanks for watching!
no longer correct
Hello Bud_51, thank you for sharing your thoughts. I appreciate your input on the topic. However, it seems like the information may be outdated or no longer correct. It's always important to double-check and verify facts before drawing any conclusions. Thank you for your comment.
@@PaddyMaddy26 The facts are: this method no longer works! I'm not an idiot (Windows 11 Pro 23H2)
I already configured it but will see if i did it correctly
Hi @user-mi4qq1sh2m, it's great that you took the initiative to configure it yourself. If you have any doubts or need assistance, feel free to reach out for help. Remember to double-check your settings to ensure they are correct. Good luck!
సార్, Intune aap మన ఫోన్ మొత్తాన్ని access చేస్తుందా., photos, whatssaap, fb, contacts లాంటివి intune control లో ఉంటాయా..??
Hello ravitejaraviteja3860, Thank you for your question. Yes, Intune allows you to have control over your device and access to various applications and features such as photos, WhatsApp, Facebook, and contacts. You can manage and secure your device, applications, and data with Intune to ensure a safe and productive experience. If you have any further questions or need assistance with using Intune, please feel free to reach out. Thank you.
లేదు ఓక వేల ఫోన్ Company owned ఐతే అప్లికేషన్స్ కంట్రోల్ లో ఉంటవి…. Personally owned devices always will have control by You
Thank you so much sir, ఈ మద్య కొత్త కంపెనీ లో join అయ్యాను, intune portal download చేసి, అన్ని permissions ఇవ్వవలిసి వచ్చింది. అందువల్ల ఈ డౌట్ వచ్చింది.
@ravitejaraviteja3860 ok np all the very best to your new job
@@PaddyMaddy26 Thank you sir
How the risk level is detected as high, medium,low in identity protection
Hi @keerthanak7841, The risk level in identity protection is typically detected based on the likelihood of unauthorized access to personal information and the potential impact it could have on an individual. Factors such as the strength of passwords, the security of online accounts, the frequency of data breaches, and the precautions taken by individuals to protect their personal information all play a role in determining the risk level. Various tools and software are available to help assess and monitor the risk level, providing alerts and recommendations for improving security measures. It's important to regularly review and update security measures to minimize the risk of identity theft and fraud. I hope this helps clarify how the risk level is detected in identity protection. Let me know if you have any further questions.
Thanks for the video
@Sudhirreddy6253 You're welcome! I'm glad you enjoyed the video. Let me know if you have any questions or if there's anything else you'd like to see in future videos. Thanks for watching!
Hi Pavan, i got stuck with one situation and need your guidance in solving it. We have our own .apk file for android devices, these are custom in-house developed applications, i want to deploy the application to Android Fully Managed devices (Since the device belongs to company). I did it before with publishing them to google play store as a private app but now the size is the problem as it exceed 200MB, so i cannot use this option. I tried with deploying them as Line of Business application but its been 2 days nothing shows on device and even in intune portal it neither failed or success. Question: How to deploy your custom .apk files to android fully managed devices if the file size se more than 200MB? Appreciate your advice and guidance on this matter as i got stuck here from last one week.
Hello there, Thank you for reaching out with your question. It sounds like you are facing a challenge with deploying your custom .apk files to Android Fully Managed devices due to the file size exceeding 200MB. One possible solution to this issue could be to split your .apk file into smaller chunks and deploy them separately. This way, you can stay within the file size limit and still have your application successfully deployed to the devices. Additionally, I recommend checking the Intune portal settings to ensure that the deployment process is properly configured and all necessary permissions are in place. Sometimes, a simple configuration error can cause delays in the deployment process. If you continue to experience difficulties with deploying your application, I suggest reaching out to the Microsoft Intune support team for further assistance. They should be able to provide more in-depth guidance and help troubleshoot any issues you may be facing. I hope this information helps and you are able to successfully deploy your custom .apk files to Android Fully Managed devices. Please let me know if you have any further questions or need additional assistance. Best of luck!
@@PaddyMaddy26 thanks for your quick response, i did check with the application team to reduce the file size or split it but as per them it will be very difficult for them to manage that. Configuration settings look ok as there is nothing much for deploy LOB apps, just upload the .apk file and assign it to group. I think need to open a case with Microsoft to get their feedback in this scenario. I though may be someone must have come across this type of requirement. Appreciate your guidance!
Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail
Hello @keerthanak7841, thank you for your question regarding the workflow for identity protection and the various aspects involved such as detection, investigation, remediation, and policy framing. Identity protection involves a multi-faceted approach to safeguarding user identities and data. 1. Detection: The detection process involves monitoring user activity and behavior in order to identify any suspicious or unauthorized access attempts. This can include monitoring login locations, times, and devices used for authentication. 2. Investigation: Once suspicious activity is detected, an investigation is initiated to determine the extent of the security breach and assess any potential damage. This may involve performing forensic analysis, reviewing logs, and conducting interviews with affected users. 3. Remediation: After the investigation is completed, appropriate remediation steps are taken to mitigate the security threat and prevent future breaches. This can include revoking access to compromised accounts, resetting passwords, and implementing additional security measures. 4. Policy Framing: Policies are essential in defining the rules and guidelines for identity protection within an organization. These policies outline the responsibilities of users, administrators, and security teams in maintaining a secure environment. Conditional access policies and device compliance are important components of identity protection. Conditional access policies allow organizations to control access to resources based on specific conditions such as user location, device type, and security posture. Device compliance ensures that only authorized and secure devices are allowed to access organizational resources. I hope this explanation helps clarify the workflow for identity protection and the significance of detection, investigation, remediation, and policy framing in maintaining a secure environment. If you have any further questions or require additional information, please feel free to ask. Thank you!
Hello sir I’m getting bellow error while imaging dell latitude 7430 laptop with win11. 0x80070002 apply operating system en-us . Contact administrator. And Sccm admin asking me to collect logs from affected system using winpe how to do that. Many thanks in adavance
Hello RameshYadav-ke5bl, I'm sorry to hear that you are experiencing an error while imaging the Dell Latitude 7430 laptop with Windows 11. The error code 0x80070002 typically indicates a problem with applying the operating system. It's great that your SCCM administrator has asked you to collect logs from the affected system using WinPE. To collect logs from the affected system using WinPE, you can follow these steps: 1. Boot the affected laptop into WinPE. 2. Once in WinPE, open a command prompt. 3. Use the command line tools in WinPE to navigate to the directory where the logs are stored. 4. Copy the logs to a USB drive or network location for analysis by your SCCM administrator. If you encounter any specific issues or need further assistance, please don't hesitate to reach out. I hope this helps resolve your imaging issue. Thank you for reaching out and good luck with troubleshooting. Best regards, Paddymaddy
Thanks.Helpfull
Hi muraleekurup3056, thank you for your comment. I am glad that you found the video helpful. If you have any more questions or need further assistance, feel free to ask. Thank you for watching!
00:00 Introduction 00:30 What is Windows LAPS? 01:30 Licensing Requirements 02:30 Supported Operating Systems 03:30 LAPS Architecture Overview 05:00 Using Microsoft Intune 06:00 IT Admin Responsibilities 07:00 Group Policy Alternatives 08:00 High-Level Steps Overview 09:30 Step 1: Enable Microsoft Entra 10:30 Step 2: Enable Built-in Admin Account 12:00 Step 3: Create Intune Policies 13:00 Assigning LAPS Policies 13:30 Demo: Retrieve and Rotate Passwords 15:00 Entra Portal Configuration 17:00 Intune Policy for Built-in Admin Account 19:30 Troubleshooting Policy Errors 22:00 Configuring Password Complexity 25:00 Checking Event Logs 27:00 Verifying Admin Account Status 28:00 Configuring LAPS Policy in Intune 30:00 Conclusion
Struggling to manage local admin passwords on your Windows endpoints?
Can u please explain the risk detection, risky sign-in and risky users ...how each is different with example
Hi @keerthanak7841, I'd be happy to explain the differences between risk detection, risky sign-in, and risky users with examples. Risk detection refers to the process of identifying potential risks or threats in a system or network. This can be done through various means such as monitoring for unusual or suspicious behavior, analyzing user activity patterns, and scanning for known vulnerabilities. For example, if a user suddenly starts attempting to access sensitive data outside of their regular working hours, this could be flagged as a potential risk. Risky sign-in, on the other hand, specifically focuses on identifying potentially unauthorized or compromised logins. This could include instances where a user logs in from a suspicious IP address, enters incorrect credentials multiple times, or uses unfamiliar devices. For instance, if a user suddenly logs in from a location that is known for cybercrime activity, this could indicate a risky sign-in. Risky users are individuals within the system who have been flagged as posing a higher-than-average risk based on their behavior or actions. This could be due to factors such as a history of previous security incidents, accessing sensitive data without proper authorization, or sharing login credentials. For example, if a user consistently ignores security protocols and shares their password with others, they may be classified as a risky user. I hope this helps clarify the distinctions between these terms. Let me know if you have any additional questions.
By end of this month I am planning to release a new dedicated course on Entra with latest changes and GUI
The best one
Thank you so much for your kind words! I'm glad you enjoyed the content. Let me know if you have any suggestions or requests for future videos.
@paddymaddy26 when I try to enroll iOS device it shows error msg as'safari could not install a profile due to unknown error ' how to solve this issue
Hello @srinivasnaidu173, Thank you for bringing this issue to our attention. The error message you are receiving, "Safari could not install a profile due to unknown error," can be quite frustrating. To resolve this issue, I recommend trying the following steps: 1. Ensure that your iOS device is running on the latest version of iOS. 2. Clear your Safari browser cache and cookies. 3. Restart your iOS device and try enrolling again. 4. If the issue persists, try using a different browser, such as Chrome or Firefox, to see if the problem is specific to Safari. If none of these solutions work, please reach out to our technical support team for further assistance. They will be able to provide more personalized troubleshooting steps to help you resolve this issue. Thank you for your patience and understanding. Let me know if you have any further questions or concerns. Best regards, Paddymaddy
@@PaddyMaddy26 Hi paddy I try all the things before but still issue persists
Hello Pavan Sir, Is there any prerequisites for learning intune. What will be the mandatory things that I need to do from my side. Please help how to begin with intune for freshers or beginners without any IT Knowledge. Thank You, Sir...!
Hello Charanbalaram4417, Thank you for reaching out with your inquiry about Intune. For beginners without any IT knowledge, I recommend starting with some foundational IT courses to familiarize yourself with basic concepts. Additionally, it would be beneficial to have a basic understanding of cloud computing and Microsoft products. To begin with Intune, it would be helpful to create a Microsoft account and access the Microsoft Learn platform, which offers free online tutorials and resources for learning Intune. I hope this helps you get started on your Intune journey. If you have any further questions, please feel free to ask. Best regards, Paddymaddy
Great! This is what I'm looking for. However, how can I automate the process?
@hoangkhangnguyencuu6135 Thank you for your positive feedback! To automate the process, you can consider using software tools or scripts that can help streamline repetitive tasks and save time. There are also automation platforms available that allow you to set up workflows and triggers to automate various actions. I recommend doing some research on automation solutions that best fit your specific needs and requirements. Hope this helps!
Hi can u please share deep details regarding device compliance...what is the purpose, how it can be implemented for identity protection ,what are the benefits of using it for identity protection
Hello keerthanak7841, thank you for your inquiry about device compliance and identity protection. Device compliance refers to ensuring that devices, such as smartphones, laptops, and tablets, meet the security standards set by an organization. The purpose of device compliance is to ensure that only trusted and secure devices are granted access to sensitive corporate data and resources. It can be implemented through the use of mobile device management (MDM) solutions, which allow organizations to enforce security policies, monitor device status, and remotely manage devices. Implementing device compliance for identity protection helps to prevent unauthorized access to corporate networks and sensitive data. By ensuring that only compliant devices are allowed access, organizations can reduce the risk of data breaches and safeguard sensitive information from cyber threats. Some benefits of using device compliance for identity protection include: 1. Enhanced security: By enforcing device compliance policies, organizations can prevent unauthorized access and protect sensitive data from cyber threats. 2. Improved productivity: Compliant devices ensure that employees can access corporate resources securely, enabling them to work efficiently and effectively. 3. Simplified management: MDM solutions provide organizations with centralized control and visibility over device compliance, making it easier to monitor and enforce security policies. 4. Regulatory compliance: Implementing device compliance helps organizations meet regulatory requirements and standards related to data security and privacy. I hope this information helps clarify the purpose and benefits of device compliance for identity protection. If you have any further questions or need additional details, please feel free to ask.
How conditional access policies works in identity protection...where the conditional access policies will come under identity protection How it benefits
Hi @keerthanak7841, Conditional access policies in identity protection work by defining specific conditions that must be met before a user can access certain resources or perform certain actions. These conditions can include factors such as the user's location, device they are using, and the time of day. By implementing conditional access policies, organizations can strengthen their security measures by ensuring that only authorized users with the appropriate permissions can access sensitive data or systems. This helps to prevent unauthorized access and reduce the risk of data breaches. Overall, the benefits of using conditional access policies in identity protection include increased security, improved compliance with regulations, and better control over user access. Organizations can customize these policies to meet their specific security needs and requirements, ultimately enhancing their overall security posture. I hope this helps clarify how conditional access policies work in identity protection and the benefits they provide. Let me know if you have any further questions.
@@PaddyMaddy26 Thank you,it helped me a lot
Hii ...Where the conditional access policies will trigger...how it will work in the workflow.. please respond ASAP
Hello @keerthanak7841, Thank you for your query regarding conditional access policies triggering and how they work in the workflow. Conditional access policies are triggered when certain conditions or criteria are met, such as user location, device health, or login behavior. These policies help ensure that only authorized users can access company resources, and provide an additional layer of security. In terms of how they work in the workflow, once a user attempts to access a resource, their request is evaluated against the conditions specified in the policy. If the conditions are met, the user is granted access. If not, they may be prompted to take additional steps, such as multi-factor authentication, to verify their identity. I hope this helps clarify how conditional access policies operate. If you have any further questions or require additional information, please feel free to ask. Best regards, Paddymaddy
@@PaddyMaddy26 How conditional access policies works in identity protection...where the conditional access policies will come under identity protection How it benefits
Please post as a new comment to get a immediate answer for your questions
Thank you very much
for your kind words and for taking the time to watch my video. I appreciate your support and I'm glad you enjoyed it. If you have any feedback or suggestions for future content, please feel free to let me know. Thanks again!
Could you please create a video on deploying the LAPS feature and assigning admin rights to specific users for specific devices using Intune? Your detailed guidance would be greatly appreciated. Thank you!
Hello Sudhirreddy6253, thank you for your suggestion! I will definitely consider creating a video on deploying the LAPS feature and assigning admin rights to specific users for specific devices using Intune. Your detailed guidance is greatly appreciated, and I will make sure to provide clear and helpful instructions in the video. Thank you for your support!
Simple fast and and claire thanks for sharing
Thank you for your feedback! We appreciate your kind words and are glad you found the video helpful. If you have any further questions or need more information, feel free to let us know. Thank you for watching and sharing!
@@PaddyMaddy26 Thank you for your feedback and your responsiveness, I would not hesitate to ask you any questions if I have them soon. Thank you
This channel gets better and better day by day
Thank you so much for your kind words! We really appreciate your support and are constantly working to improve and provide great content for our viewers. Stay tuned for more exciting updates and videos!
Plz add more videos
Dear RahulThakur-ix3up, Thank you for your feedback and suggestion. We are always looking for ways to improve and provide valuable content for our viewers. We will definitely take your request into consideration and work on adding more videos in the future. Thank you for supporting our channel and stay tuned for more updates. Best regards, Paddymaddy
HI Paddy thanks for sharing this Information. I would appreciate if you can share us the lastest excel sheet in github as this is 3 yrs older if you are having it please share it..
Sure give me some time will surely update it
Hello happyshoppi1036, thank you for your comment. I apologize for the outdated excel sheet, I will work on updating it and sharing the latest version on our GitHub repository. I appreciate your interest and I will make sure to keep you informed once the updated excel sheet is available. Thank you for your attention to detail.
Yes... Highly appreciate your effort. One suggestion, please disable or change the animation and annoying bell sound. It will be very helpful. Your content is amazing.
Thank you for your feedback, Siva-xq1qd! I will definitely take your suggestion into consideration and work on disabling or changing the animation and bell sound in future videos. I'm glad you enjoy the content, and I appreciate your support. Thank you for watching!