Paddy Maddy
Paddy Maddy
  • 1 025
  • 3 951 677
Control USB Access with Microsoft Intune and Defender for Endpoint Step by Step to Block or Allow
📢 Control USB Access with Microsoft Intune and Defender for Endpoint | Step-by-Step Guide to Block or Allow USB Drives
Welcome to my channel! This comprehensive tutorial will walk you through the process of controlling USB access using Microsoft Intune and Defender for Endpoint. Whether you want to block or allow USB drives, this step-by-step guide will help you effectively manage your organization's device security.
🔍 In this video, you'll learn:
Introduction to Microsoft Intune and Defender for Endpoint
How to configure Intune policies to manage USB drive access
Step-by-step instructions to block USB drives
How to allow USB drives for specific users or devices
Best practices for managing device security in your organization
🚀 Why control USB access?
Controlling USB access is crucial for protecting sensitive data and preventing unauthorized data transfers. By using Microsoft Intune and Defender for Endpoint, you can ensure your organization maintains a high level of security and compliance.
🔧 Tools you'll need:
Microsoft Intune
Microsoft Defender for Endpoint
📌 Chapters:
0:00 Introduction
0:20 Prerequisites: Microsoft Defender Plan License
1:16 Configuring the Policy: Endpoint Security and Attack Surface Reduction (ASR)
2:10 Creating a New Policy for Windows 10 or Later
3:08 Device Controller Configuration for Removable Media Control
3:45 Blocking USB Drives: Step-by-Step
5:00 Advanced Blocking Options and Driver Control
6:00 Specific Permissions: Read, Write, Execute
7:00 Assignment to Target Groups and Finalizing the Policy
7:36 Conclusion and Best Practices
💬 Have questions or need help? Drop a comment below, and we'll be happy to assist you!
👍 If you found this video helpful, please like, subscribe, and share it with others who might benefit. Don't forget to hit the bell icon to stay updated with our latest videos!
Join PaddyMaddy channel to get access to perks:
👉 ua-cam.com/channels/lNOBXkearuQ3lPgmHmpBDw.htmljoin
#PaddyMaddy #Intune #DefenderForEndpoint #USBSecurity #DeviceManagement #CyberSecurity #TechTutorial
Переглядів: 297

Відео

Configure Windows LAPS with Microsoft Intune: A Step-by-Step Guide
Переглядів 456День тому
Manage Windows LAPS policy with Microsoft Intune How to Set Up Windows LAPS with Microsoft Intune Set up Windows LAPS with Intune: A Step-by-Step Guide Step-by-Step Guide: Enabling Windows LAPS in Entra ID Manage Windows LAPS from Intune Configure Windows LAPS in Intune Windows LAPS and Intune Windows LAPS Management using Microsoft Intune Deploy Cloud-Based Windows LAPS to Windows Endpoints St...
Step-by-Step Guide: How to Create a Free Azure Subscription or Pay-As-You-Go Model
Переглядів 24114 днів тому
Welcome to our comprehensive guide on how to create a free Azure subscription or opt for the pay-as-you-go model. In this video, we will walk you through the entire process, from opening your browser to verifying your account details. Whether you're looking to explore Azure's free services or ready to pay as you go, this tutorial has you covered. By the end of this video, you'll have a clear un...
Introduction to Microsoft Entra: Exploring the Multicloud Identity and Access Solutions
Переглядів 22721 день тому
Introduction to Microsoft Entra: Exploring the Multicloud Identity and Access Solutions
Microsoft Entra: Understanding the New Name for Azure Active Directory
Переглядів 19921 день тому
Microsoft Entra: Understanding the New Name for Azure Active Directory
Azure Active Directory is Now Microsoft Entra! - What You Need to Know (2024 Update)
Переглядів 26221 день тому
Azure Active Directory is Now Microsoft Entra! - What You Need to Know (2024 Update)
Microsoft Entra ID Device Join Types Entra Registered vs Entra Joined vs Entra Hybrid join
Переглядів 34128 днів тому
Microsoft Entra ID Device Join Types Entra Registered vs Entra Joined vs Entra Hybrid join
Enroll Configuration Manager Devices into Endpoint Analytics
Переглядів 3373 місяці тому
Enroll Configuration Manager Devices into Endpoint Analytics
Enroll Intune Devices into Endpoint Analytics
Переглядів 2663 місяці тому
Enroll Intune Devices into Endpoint Analytics
Enroll Intune and Configuration Manager devices into Endpoint analytics
Переглядів 1533 місяці тому
Enroll Intune and Configuration Manager devices into Endpoint analytics
What is Advanced Endpoint Analytics
Переглядів 2233 місяці тому
What is Advanced Endpoint Analytics
Microsoft Endpoint Analytics Understand Endpoint Analytics Scores, Baselines, and Insights
Переглядів 1954 місяці тому
Microsoft Endpoint Analytics Understand Endpoint Analytics Scores, Baselines, and Insights
Endpoint Analytics Prerequisites
Переглядів 1594 місяці тому
Endpoint Analytics Prerequisites
Your Endpoint Analytics Deep Dive: A Comprehensive Overview (Intune & SCCM)
Переглядів 3054 місяці тому
Your Endpoint Analytics Deep Dive: A Comprehensive Overview (Intune & SCCM)
Microsoft Intune License Options | Microsoft Intune Plans and Pricing
Переглядів 1,6 тис.4 місяці тому
Microsoft Intune License Options | Microsoft Intune Plans and Pricing
Mastering Microsoft Configuration Manager (SCCM): 2023 Client Push Deployment Tutorial
Переглядів 2 тис.8 місяців тому
Mastering Microsoft Configuration Manager (SCCM): 2023 Client Push Deployment Tutorial
Step-by-Step Guide: Microsoft Configuration Manager Client Installation [2023]
Переглядів 2,8 тис.8 місяців тому
Step-by-Step Guide: Microsoft Configuration Manager Client Installation [2023]
Configuring 👉Microsoft Configuration Manager Boundaries, Groups And Discovery Methods 🔍
Переглядів 8989 місяців тому
Configuring 👉Microsoft Configuration Manager Boundaries, Groups And Discovery Methods 🔍
Configuration Manager Hierarchy Site Design and Scale Numbers Explained
Переглядів 6839 місяців тому
Configuration Manager Hierarchy Site Design and Scale Numbers Explained
How do I notify Azure Active Directory users when password is about to expire?
Переглядів 6 тис.9 місяців тому
How do I notify Azure Active Directory users when password is about to expire?
Step-by-Step Guide: Creating a Microsoft Active Directory Domain Controller
Переглядів 2,7 тис.9 місяців тому
Step-by-Step Guide: Creating a Microsoft Active Directory Domain Controller
Installing Prerequisites for Configuration Manager Step by Step
Переглядів 2,6 тис.9 місяців тому
Installing Prerequisites for Configuration Manager Step by Step
Exploring MSCM Site Types Understanding Hierarchy and Site Types Functionality
Переглядів 6779 місяців тому
Exploring MSCM Site Types Understanding Hierarchy and Site Types Functionality
How to Block Microsoft Office 365 Attachments on Personal Devices | Cloud App Security Tutorial
Переглядів 2,1 тис.11 місяців тому
How to Block Microsoft Office 365 Attachments on Personal Devices | Cloud App Security Tutorial
Microsoft Intune Zero Trust Security Model
Переглядів 783Рік тому
Microsoft Intune Zero Trust Security Model
Revolutionize Your IT Support with Remote Help in Microsoft Intune
Переглядів 1,6 тис.Рік тому
Revolutionize Your IT Support with Remote Help in Microsoft Intune
Deploying Company Portal Application using Microsoft Intune: Complete Demo
Переглядів 11 тис.Рік тому
Deploying Company Portal Application using Microsoft Intune: Complete Demo
Step-by-Step Guide: How to Configure and Take Remote Control with Microsoft Intune Remote Help
Переглядів 6 тис.Рік тому
Step-by-Step Guide: How to Configure and Take Remote Control with Microsoft Intune Remote Help
Display Lock Screen Message for iOS Devices with Intune
Переглядів 1,8 тис.Рік тому
Display Lock Screen Message for iOS Devices with Intune
Intune Multiple Admin Approval (MAA) overview with short demo
Переглядів 525Рік тому
Intune Multiple Admin Approval (MAA) overview with short demo

КОМЕНТАРІ

  • @srich9382
    @srich9382 20 годин тому

    how to unionstall edge browser on android device. we deployed edge browser through android apps. Is it possible pls let me know

    • @PaddyMaddy26
      @PaddyMaddy26 20 годин тому

      Hi @srich9382, thank you for reaching out. Unfortunately, as of now, Microsoft Edge browser is not officially supported on Android devices. It may be possible to install it through unofficial means, but we recommend using browsers that are specifically optimized for Android devices to ensure a smooth browsing experience. If you have any other questions or concerns, feel free to ask. Thank you.

    • @srich9382
      @srich9382 20 годин тому

      @@PaddyMaddy26 I want to expert intune. i want to join a course online. pls let me know when will u start the calls. not udemy.

  • @vanshmittal767
    @vanshmittal767 4 дні тому

    Paddy Maddy, really helpful, thanks for the effort you put in.

    • @PaddyMaddy26
      @PaddyMaddy26 4 дні тому

      Thank you for your kind words, I'm glad to hear that you found the content helpful. I appreciate your recognition of the effort I put into creating these videos. If you have any more questions or topics you'd like me to cover, feel free to let me know. Thank you for watching!

  • @mohammadkarvani6913
    @mohammadkarvani6913 6 днів тому

    Thank you❤

    • @PaddyMaddy26
      @PaddyMaddy26 6 днів тому

      Hi Mohammadkarvani6913, thank you so much for your kind words and support! ❤️ I appreciate you taking the time to leave a comment. If you have any questions or need any further assistance, feel free to reach out. Have a great day!

    • @mohammadkarvani6913
      @mohammadkarvani6913 6 днів тому

      ​@@PaddyMaddy26I have no questions at the moment. Thankful

    • @PaddyMaddy26
      @PaddyMaddy26 6 днів тому

      When you any questions please post as a new comment you will get a response within 10 minutes round the clock… it’s my SLA to respond to all new comments…Thank you

  • @Jello_o
    @Jello_o 6 днів тому

    Sir please Can you make videos on Azure DevOPS Azure Kubernetes With practical examples I’m in a very problematic situation in my project, I joined my company as an Azure Engineer but since the project was already completed so we are just in the project to support and do some minor changes. The market demands for Azure DevOPS, IAAC, Kubernetes. Since this current project does not offer any such thing I’m just stuck here and looking forward for some easy tutorials on these topics. Your videos have helped me in cracking interviews when I had almost 0 exp in azure, so it’s a humble request to you to cover on these topics. It will be really helpful to people like us who are stuck in support projects and want to move to development and migration projects.

    • @PaddyMaddy26
      @PaddyMaddy26 6 днів тому

      Hello Jello_o, Thank you for your suggestion. I will definitely consider creating videos on Azure DevOps and Azure Kubernetes with practical examples in the future. Stay tuned for more content on these topics! Best regards, Paddymaddy

    • @Jello_o
      @Jello_o 6 днів тому

      @@PaddyMaddy26Thank you so much sir

  • @reddykumari5766
    @reddykumari5766 6 днів тому

    Hi bro DP 900 CERTIFICATE CHEYYALLI CAN U HELP ME THAT WHICH LINK I HAVE TO USED

    • @PaddyMaddy26
      @PaddyMaddy26 6 днів тому

      Hi Reddy Garu, What help you need ?

  • @gpm-pt1dg
    @gpm-pt1dg 7 днів тому

    Hi sir i need personal training fast track. Is any classes will start soon?

    • @PaddyMaddy26
      @PaddyMaddy26 7 днів тому

      I am not teaching online .. I have posted in UA-cam and Udemy

  • @aniyahudi
    @aniyahudi 7 днів тому

    Hi. thank you for the great video. Is it possible to hire you to help us with the Azure Virtual Desktop?

    • @PaddyMaddy26
      @PaddyMaddy26 7 днів тому

      You can book a FREE consulting slot to understand your requirements from my calendar paddymaddy.setmore.com/paddymaddy

    • @PaddyMaddy26
      @PaddyMaddy26 7 днів тому

      Hi Aniyahudi, thank you for watching the video and for your interest in our services. We would be happy to discuss the possibility of working with you to help with Azure Virtual Desktop. Please feel free to reach out to us via paddymaddy.setmore.com/paddymaddy to discuss further details and potential collaboration. Thank you!

  • @ashishpatel0123
    @ashishpatel0123 8 днів тому

    Such a informative video for beginners. Nice One.

    • @PaddyMaddy26
      @PaddyMaddy26 8 днів тому

      Thank you for your positive feedback! I'm glad you found the video informative for beginners. Please let me know if you have any questions or if there is anything else you would like to learn about.

  • @TechNerd202
    @TechNerd202 8 днів тому

    It worked😀 🙌🏻…Thank you so much for taking your time to make this video. I really appreciate your efforts👍🏻. Currently it is working as expected with blocking only usb drive and allowing mouse/keyboards, i will try to add exclusion for some particular devices then will see how it behave.

    • @PaddyMaddy26
      @PaddyMaddy26 8 днів тому

      Thank you for your feedback, TechNerd202! I'm glad to hear that the video was helpful and that the solution is working as expected for you. Good luck with adding exclusions for specific devices and feel free to reach out if you have any further questions. Your support and appreciation mean a lot to me. Thank you! 👍🏻

  • @shabeelaboobacker352
    @shabeelaboobacker352 8 днів тому

    Your contents are solid & commercially useful.

    • @PaddyMaddy26
      @PaddyMaddy26 8 днів тому

      Thank you so much for your kind words! I'm glad to hear that you find my content valuable and commercially useful. It's always motivating to receive positive feedback like yours. I appreciate you taking the time to leave a comment. If you have any suggestions for future content or topics you'd like to see covered, feel free to let me know. Thanks again for your support!

  • @sandeshbhoye5235
    @sandeshbhoye5235 9 днів тому

    I just whittled down to 2 words after watching this video : "Thank you!"

    • @PaddyMaddy26
      @PaddyMaddy26 9 днів тому

      Thank you for your kind words! I'm glad you enjoyed the video. If you have any suggestions for future content, feel free to let me know.

  • @pedroamador2838
    @pedroamador2838 11 днів тому

    Too long of a titles makes me not want to watch the video change that man

    • @PaddyMaddy26
      @PaddyMaddy26 11 днів тому

      Thank you for your feedback, we appreciate your input. We will take your suggestion into consideration for future videos. Thank you for watching and for your support.

  • @TechNerd202
    @TechNerd202 11 днів тому

    Hi Pavan, thanks for the video 👍, i have a question not related to this topic, could not find your playlist so i am posting it here. I want to block USB access for windows devices either from Intune or Defender for Endpoint but allow the basic USB devices like Mouse and Keyboards to work. I have tried creating policy from Configuration Profile (Administrative Template) and from Device Control (ASR) but nothing seems to work the way it should be. As per the MS documents it is simple but in practical it is not working. Either it is blocking all USB or Allowing all. I have gone through many youtube video but could not find a easy and best way which work. Have you tried this scenario and did it work, if not then could you add this to your list as it will be very helpful for others as well, since this is the basic requirement of every organization which is using Defender for Endpoint but achieving the desired result seems quite difficult.

    • @PaddyMaddy26
      @PaddyMaddy26 11 днів тому

      Hi there! Thank you for reaching out and sharing your experience with trying to block USB access for Windows devices. I understand how frustrating it can be when the functionality doesn't work as expected, despite following the official documentation. I haven't personally tried this specific scenario myself, but I can definitely look into it further and see if I can provide any helpful tips or solutions. It's important to find a way to achieve the desired result, especially for organizations using Defender for Endpoint. I appreciate your suggestion to add this topic to my list for future videos, as it could certainly benefit others facing similar challenges. Thank you for bringing this to my attention, and I'll do my best to assist in any way I can. Feel free to let me know if you have any specific questions or details that may help me better understand the issue you're facing. Thank you!

    • @TechNerd202
      @TechNerd202 11 днів тому

      @@PaddyMaddy26 thanks 🙂

    • @PaddyMaddy26
      @PaddyMaddy26 11 днів тому

      Do you need to block all or allow all based on Security groups ?… if this is required I can make a video as I have done this many times… But what’s challenging is a specific to a usb white list is not working these are in preview at this time

    • @TechNerd202
      @TechNerd202 11 днів тому

      @@PaddyMaddy26 currently the requirement is to block usb access to all users but keyboard/mouse should work. If possible then we can have a exclusion group to give permission to particular user or department. We dont have a requirement to whitelist any usb device. Only thing is mouse and keyboard should work. We have both ME3 and ME5 licens

    • @PaddyMaddy26
      @PaddyMaddy26 11 днів тому

      @user-mi4qq1sh2m it’s a easy one.. give me few hours to share a video it’s Saturday I can make a video for you..

  • @mallicse568
    @mallicse568 13 днів тому

    Can I have these slides We will pay for that These are large videos Takes more time to complete If the PPT are in handy ...we can access easily

    • @PaddyMaddy26
      @PaddyMaddy26 13 днів тому

      Hello @mallicse568, thank you for your interest in our slides. Unfortunately, we do not offer them for purchase at this time. However, we appreciate your offer to pay for them and will take it into consideration for future offerings. Thank you for understanding.

  • @colaaluk
    @colaaluk 13 днів тому

    Great video

    • @PaddyMaddy26
      @PaddyMaddy26 13 днів тому

      Thank you so much for your kind words! I'm glad you enjoyed the video. If you have any suggestions for future content, feel free to let me know. Thanks for watching!

  • @Bud_51
    @Bud_51 14 днів тому

    no longer correct

    • @PaddyMaddy26
      @PaddyMaddy26 14 днів тому

      Hello Bud_51, thank you for sharing your thoughts. I appreciate your input on the topic. However, it seems like the information may be outdated or no longer correct. It's always important to double-check and verify facts before drawing any conclusions. Thank you for your comment.

    • @Bud_51
      @Bud_51 14 днів тому

      @@PaddyMaddy26 The facts are: this method no longer works! I'm not an idiot (Windows 11 Pro 23H2)

  • @TechNerd202
    @TechNerd202 15 днів тому

    I already configured it but will see if i did it correctly

    • @PaddyMaddy26
      @PaddyMaddy26 15 днів тому

      Hi @user-mi4qq1sh2m, it's great that you took the initiative to configure it yourself. If you have any doubts or need assistance, feel free to reach out for help. Remember to double-check your settings to ensure they are correct. Good luck!

  • @ravitejaraviteja3860
    @ravitejaraviteja3860 15 днів тому

    సార్, Intune aap మన ఫోన్ మొత్తాన్ని access చేస్తుందా., photos, whatssaap, fb, contacts లాంటివి intune control లో ఉంటాయా..??

    • @PaddyMaddy26
      @PaddyMaddy26 15 днів тому

      Hello ravitejaraviteja3860, Thank you for your question. Yes, Intune allows you to have control over your device and access to various applications and features such as photos, WhatsApp, Facebook, and contacts. You can manage and secure your device, applications, and data with Intune to ensure a safe and productive experience. If you have any further questions or need assistance with using Intune, please feel free to reach out. Thank you.

    • @PaddyMaddy26
      @PaddyMaddy26 15 днів тому

      లేదు ఓక వేల ఫోన్ Company owned ఐతే అప్లికేషన్స్ కంట్రోల్ లో ఉంటవి…. Personally owned devices always will have control by You

    • @ravitejaraviteja3860
      @ravitejaraviteja3860 15 днів тому

      Thank you so much sir, ఈ మద్య కొత్త కంపెనీ లో join అయ్యాను, intune portal download చేసి, అన్ని permissions ఇవ్వవలిసి వచ్చింది. అందువల్ల ఈ డౌట్ వచ్చింది.

    • @PaddyMaddy26
      @PaddyMaddy26 15 днів тому

      @ravitejaraviteja3860 ok np all the very best to your new job

    • @ravitejaraviteja3860
      @ravitejaraviteja3860 15 днів тому

      @@PaddyMaddy26 Thank you sir

  • @keerthanak7841
    @keerthanak7841 16 днів тому

    How the risk level is detected as high, medium,low in identity protection

    • @PaddyMaddy26
      @PaddyMaddy26 16 днів тому

      Hi @keerthanak7841, The risk level in identity protection is typically detected based on the likelihood of unauthorized access to personal information and the potential impact it could have on an individual. Factors such as the strength of passwords, the security of online accounts, the frequency of data breaches, and the precautions taken by individuals to protect their personal information all play a role in determining the risk level. Various tools and software are available to help assess and monitor the risk level, providing alerts and recommendations for improving security measures. It's important to regularly review and update security measures to minimize the risk of identity theft and fraud. I hope this helps clarify how the risk level is detected in identity protection. Let me know if you have any further questions.

  • @sudhirreddy6253
    @sudhirreddy6253 16 днів тому

    Thanks for the video

    • @PaddyMaddy26
      @PaddyMaddy26 16 днів тому

      @Sudhirreddy6253 You're welcome! I'm glad you enjoyed the video. Let me know if you have any questions or if there's anything else you'd like to see in future videos. Thanks for watching!

  • @TechNerd202
    @TechNerd202 16 днів тому

    Hi Pavan, i got stuck with one situation and need your guidance in solving it. We have our own .apk file for android devices, these are custom in-house developed applications, i want to deploy the application to Android Fully Managed devices (Since the device belongs to company). I did it before with publishing them to google play store as a private app but now the size is the problem as it exceed 200MB, so i cannot use this option. I tried with deploying them as Line of Business application but its been 2 days nothing shows on device and even in intune portal it neither failed or success. Question: How to deploy your custom .apk files to android fully managed devices if the file size se more than 200MB? Appreciate your advice and guidance on this matter as i got stuck here from last one week.

    • @PaddyMaddy26
      @PaddyMaddy26 16 днів тому

      Hello there, Thank you for reaching out with your question. It sounds like you are facing a challenge with deploying your custom .apk files to Android Fully Managed devices due to the file size exceeding 200MB. One possible solution to this issue could be to split your .apk file into smaller chunks and deploy them separately. This way, you can stay within the file size limit and still have your application successfully deployed to the devices. Additionally, I recommend checking the Intune portal settings to ensure that the deployment process is properly configured and all necessary permissions are in place. Sometimes, a simple configuration error can cause delays in the deployment process. If you continue to experience difficulties with deploying your application, I suggest reaching out to the Microsoft Intune support team for further assistance. They should be able to provide more in-depth guidance and help troubleshoot any issues you may be facing. I hope this information helps and you are able to successfully deploy your custom .apk files to Android Fully Managed devices. Please let me know if you have any further questions or need additional assistance. Best of luck!

    • @TechNerd202
      @TechNerd202 16 днів тому

      @@PaddyMaddy26 thanks for your quick response, i did check with the application team to reduce the file size or split it but as per them it will be very difficult for them to manage that. Configuration settings look ok as there is nothing much for deploy LOB apps, just upload the .apk file and assign it to group. I think need to open a case with Microsoft to get their feedback in this scenario. I though may be someone must have come across this type of requirement. Appreciate your guidance!

  • @keerthanak7841
    @keerthanak7841 17 днів тому

    Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail

    • @PaddyMaddy26
      @PaddyMaddy26 17 днів тому

      Hello @keerthanak7841, thank you for your question regarding the workflow for identity protection and the various aspects involved such as detection, investigation, remediation, and policy framing. Identity protection involves a multi-faceted approach to safeguarding user identities and data. 1. Detection: The detection process involves monitoring user activity and behavior in order to identify any suspicious or unauthorized access attempts. This can include monitoring login locations, times, and devices used for authentication. 2. Investigation: Once suspicious activity is detected, an investigation is initiated to determine the extent of the security breach and assess any potential damage. This may involve performing forensic analysis, reviewing logs, and conducting interviews with affected users. 3. Remediation: After the investigation is completed, appropriate remediation steps are taken to mitigate the security threat and prevent future breaches. This can include revoking access to compromised accounts, resetting passwords, and implementing additional security measures. 4. Policy Framing: Policies are essential in defining the rules and guidelines for identity protection within an organization. These policies outline the responsibilities of users, administrators, and security teams in maintaining a secure environment. Conditional access policies and device compliance are important components of identity protection. Conditional access policies allow organizations to control access to resources based on specific conditions such as user location, device type, and security posture. Device compliance ensures that only authorized and secure devices are allowed to access organizational resources. I hope this explanation helps clarify the workflow for identity protection and the significance of detection, investigation, remediation, and policy framing in maintaining a secure environment. If you have any further questions or require additional information, please feel free to ask. Thank you!

  • @RameshYadav-ke5bl
    @RameshYadav-ke5bl 18 днів тому

    Hello sir I’m getting bellow error while imaging dell latitude 7430 laptop with win11. 0x80070002 apply operating system en-us . Contact administrator. And Sccm admin asking me to collect logs from affected system using winpe how to do that. Many thanks in adavance

    • @PaddyMaddy26
      @PaddyMaddy26 18 днів тому

      Hello RameshYadav-ke5bl, I'm sorry to hear that you are experiencing an error while imaging the Dell Latitude 7430 laptop with Windows 11. The error code 0x80070002 typically indicates a problem with applying the operating system. It's great that your SCCM administrator has asked you to collect logs from the affected system using WinPE. To collect logs from the affected system using WinPE, you can follow these steps: 1. Boot the affected laptop into WinPE. 2. Once in WinPE, open a command prompt. 3. Use the command line tools in WinPE to navigate to the directory where the logs are stored. 4. Copy the logs to a USB drive or network location for analysis by your SCCM administrator. If you encounter any specific issues or need further assistance, please don't hesitate to reach out. I hope this helps resolve your imaging issue. Thank you for reaching out and good luck with troubleshooting. Best regards, Paddymaddy

  • @muraleekurup3056
    @muraleekurup3056 18 днів тому

    Thanks.Helpfull

    • @PaddyMaddy26
      @PaddyMaddy26 18 днів тому

      Hi muraleekurup3056, thank you for your comment. I am glad that you found the video helpful. If you have any more questions or need further assistance, feel free to ask. Thank you for watching!

  • @PaddyMaddy26
    @PaddyMaddy26 19 днів тому

    00:00 Introduction 00:30 What is Windows LAPS? 01:30 Licensing Requirements 02:30 Supported Operating Systems 03:30 LAPS Architecture Overview 05:00 Using Microsoft Intune 06:00 IT Admin Responsibilities 07:00 Group Policy Alternatives 08:00 High-Level Steps Overview 09:30 Step 1: Enable Microsoft Entra 10:30 Step 2: Enable Built-in Admin Account 12:00 Step 3: Create Intune Policies 13:00 Assigning LAPS Policies 13:30 Demo: Retrieve and Rotate Passwords 15:00 Entra Portal Configuration 17:00 Intune Policy for Built-in Admin Account 19:30 Troubleshooting Policy Errors 22:00 Configuring Password Complexity 25:00 Checking Event Logs 27:00 Verifying Admin Account Status 28:00 Configuring LAPS Policy in Intune 30:00 Conclusion

  • @PaddyMaddy26
    @PaddyMaddy26 19 днів тому

    Struggling to manage local admin passwords on your Windows endpoints?

  • @keerthanak7841
    @keerthanak7841 19 днів тому

    Can u please explain the risk detection, risky sign-in and risky users ...how each is different with example

    • @PaddyMaddy26
      @PaddyMaddy26 19 днів тому

      Hi @keerthanak7841, I'd be happy to explain the differences between risk detection, risky sign-in, and risky users with examples. Risk detection refers to the process of identifying potential risks or threats in a system or network. This can be done through various means such as monitoring for unusual or suspicious behavior, analyzing user activity patterns, and scanning for known vulnerabilities. For example, if a user suddenly starts attempting to access sensitive data outside of their regular working hours, this could be flagged as a potential risk. Risky sign-in, on the other hand, specifically focuses on identifying potentially unauthorized or compromised logins. This could include instances where a user logs in from a suspicious IP address, enters incorrect credentials multiple times, or uses unfamiliar devices. For instance, if a user suddenly logs in from a location that is known for cybercrime activity, this could indicate a risky sign-in. Risky users are individuals within the system who have been flagged as posing a higher-than-average risk based on their behavior or actions. This could be due to factors such as a history of previous security incidents, accessing sensitive data without proper authorization, or sharing login credentials. For example, if a user consistently ignores security protocols and shares their password with others, they may be classified as a risky user. I hope this helps clarify the distinctions between these terms. Let me know if you have any additional questions.

    • @PaddyMaddy26
      @PaddyMaddy26 19 днів тому

      By end of this month I am planning to release a new dedicated course on Entra with latest changes and GUI

  • @JoseCastro-ql1yl
    @JoseCastro-ql1yl 20 днів тому

    The best one

    • @PaddyMaddy26
      @PaddyMaddy26 20 днів тому

      Thank you so much for your kind words! I'm glad you enjoyed the content. Let me know if you have any suggestions or requests for future videos.

  • @srinivasnaidu173
    @srinivasnaidu173 20 днів тому

    @paddymaddy26 when I try to enroll iOS device it shows error msg as'safari could not install a profile due to unknown error ' how to solve this issue

    • @PaddyMaddy26
      @PaddyMaddy26 20 днів тому

      Hello @srinivasnaidu173, Thank you for bringing this issue to our attention. The error message you are receiving, "Safari could not install a profile due to unknown error," can be quite frustrating. To resolve this issue, I recommend trying the following steps: 1. Ensure that your iOS device is running on the latest version of iOS. 2. Clear your Safari browser cache and cookies. 3. Restart your iOS device and try enrolling again. 4. If the issue persists, try using a different browser, such as Chrome or Firefox, to see if the problem is specific to Safari. If none of these solutions work, please reach out to our technical support team for further assistance. They will be able to provide more personalized troubleshooting steps to help you resolve this issue. Thank you for your patience and understanding. Let me know if you have any further questions or concerns. Best regards, Paddymaddy

    • @srinivasnaidu173
      @srinivasnaidu173 20 днів тому

      @@PaddyMaddy26 Hi paddy I try all the things before but still issue persists

  • @charanbalaram4417
    @charanbalaram4417 20 днів тому

    Hello Pavan Sir, Is there any prerequisites for learning intune. What will be the mandatory things that I need to do from my side. Please help how to begin with intune for freshers or beginners without any IT Knowledge. Thank You, Sir...!

    • @PaddyMaddy26
      @PaddyMaddy26 20 днів тому

      Hello Charanbalaram4417, Thank you for reaching out with your inquiry about Intune. For beginners without any IT knowledge, I recommend starting with some foundational IT courses to familiarize yourself with basic concepts. Additionally, it would be beneficial to have a basic understanding of cloud computing and Microsoft products. To begin with Intune, it would be helpful to create a Microsoft account and access the Microsoft Learn platform, which offers free online tutorials and resources for learning Intune. I hope this helps you get started on your Intune journey. If you have any further questions, please feel free to ask. Best regards, Paddymaddy

  • @hoangkhangnguyencuu6135
    @hoangkhangnguyencuu6135 20 днів тому

    Great! This is what I'm looking for. However, how can I automate the process?

    • @PaddyMaddy26
      @PaddyMaddy26 20 днів тому

      @hoangkhangnguyencuu6135 Thank you for your positive feedback! To automate the process, you can consider using software tools or scripts that can help streamline repetitive tasks and save time. There are also automation platforms available that allow you to set up workflows and triggers to automate various actions. I recommend doing some research on automation solutions that best fit your specific needs and requirements. Hope this helps!

  • @keerthanak7841
    @keerthanak7841 21 день тому

    Hi can u please share deep details regarding device compliance...what is the purpose, how it can be implemented for identity protection ,what are the benefits of using it for identity protection

    • @PaddyMaddy26
      @PaddyMaddy26 21 день тому

      Hello keerthanak7841, thank you for your inquiry about device compliance and identity protection. Device compliance refers to ensuring that devices, such as smartphones, laptops, and tablets, meet the security standards set by an organization. The purpose of device compliance is to ensure that only trusted and secure devices are granted access to sensitive corporate data and resources. It can be implemented through the use of mobile device management (MDM) solutions, which allow organizations to enforce security policies, monitor device status, and remotely manage devices. Implementing device compliance for identity protection helps to prevent unauthorized access to corporate networks and sensitive data. By ensuring that only compliant devices are allowed access, organizations can reduce the risk of data breaches and safeguard sensitive information from cyber threats. Some benefits of using device compliance for identity protection include: 1. Enhanced security: By enforcing device compliance policies, organizations can prevent unauthorized access and protect sensitive data from cyber threats. 2. Improved productivity: Compliant devices ensure that employees can access corporate resources securely, enabling them to work efficiently and effectively. 3. Simplified management: MDM solutions provide organizations with centralized control and visibility over device compliance, making it easier to monitor and enforce security policies. 4. Regulatory compliance: Implementing device compliance helps organizations meet regulatory requirements and standards related to data security and privacy. I hope this information helps clarify the purpose and benefits of device compliance for identity protection. If you have any further questions or need additional details, please feel free to ask.

  • @keerthanak7841
    @keerthanak7841 21 день тому

    How conditional access policies works in identity protection...where the conditional access policies will come under identity protection How it benefits

    • @PaddyMaddy26
      @PaddyMaddy26 21 день тому

      Hi @keerthanak7841, Conditional access policies in identity protection work by defining specific conditions that must be met before a user can access certain resources or perform certain actions. These conditions can include factors such as the user's location, device they are using, and the time of day. By implementing conditional access policies, organizations can strengthen their security measures by ensuring that only authorized users with the appropriate permissions can access sensitive data or systems. This helps to prevent unauthorized access and reduce the risk of data breaches. Overall, the benefits of using conditional access policies in identity protection include increased security, improved compliance with regulations, and better control over user access. Organizations can customize these policies to meet their specific security needs and requirements, ultimately enhancing their overall security posture. I hope this helps clarify how conditional access policies work in identity protection and the benefits they provide. Let me know if you have any further questions.

    • @keerthanak7841
      @keerthanak7841 21 день тому

      @@PaddyMaddy26 Thank you,it helped me a lot

  • @keerthanak7841
    @keerthanak7841 21 день тому

    Hii ...Where the conditional access policies will trigger...how it will work in the workflow.. please respond ASAP

    • @PaddyMaddy26
      @PaddyMaddy26 21 день тому

      Hello @keerthanak7841, Thank you for your query regarding conditional access policies triggering and how they work in the workflow. Conditional access policies are triggered when certain conditions or criteria are met, such as user location, device health, or login behavior. These policies help ensure that only authorized users can access company resources, and provide an additional layer of security. In terms of how they work in the workflow, once a user attempts to access a resource, their request is evaluated against the conditions specified in the policy. If the conditions are met, the user is granted access. If not, they may be prompted to take additional steps, such as multi-factor authentication, to verify their identity. I hope this helps clarify how conditional access policies operate. If you have any further questions or require additional information, please feel free to ask. Best regards, Paddymaddy

    • @keerthanak7841
      @keerthanak7841 21 день тому

      @@PaddyMaddy26 How conditional access policies works in identity protection...where the conditional access policies will come under identity protection How it benefits

    • @PaddyMaddy26
      @PaddyMaddy26 21 день тому

      Please post as a new comment to get a immediate answer for your questions

  • @K0ralowiec
    @K0ralowiec 21 день тому

    Thank you very much

    • @PaddyMaddy26
      @PaddyMaddy26 21 день тому

      for your kind words and for taking the time to watch my video. I appreciate your support and I'm glad you enjoyed it. If you have any feedback or suggestions for future content, please feel free to let me know. Thanks again!

  • @sudhirreddy6253
    @sudhirreddy6253 22 дні тому

    Could you please create a video on deploying the LAPS feature and assigning admin rights to specific users for specific devices using Intune? Your detailed guidance would be greatly appreciated. Thank you!

    • @PaddyMaddy26
      @PaddyMaddy26 22 дні тому

      Hello Sudhirreddy6253, thank you for your suggestion! I will definitely consider creating a video on deploying the LAPS feature and assigning admin rights to specific users for specific devices using Intune. Your detailed guidance is greatly appreciated, and I will make sure to provide clear and helpful instructions in the video. Thank you for your support!

  • @ismailfatah350
    @ismailfatah350 24 дні тому

    Simple fast and and claire thanks for sharing

    • @PaddyMaddy26
      @PaddyMaddy26 24 дні тому

      Thank you for your feedback! We appreciate your kind words and are glad you found the video helpful. If you have any further questions or need more information, feel free to let us know. Thank you for watching and sharing!

    • @ismailfatah350
      @ismailfatah350 24 дні тому

      @@PaddyMaddy26 Thank you for your feedback and your responsiveness, I would not hesitate to ask you any questions if I have them soon. Thank you

  • @Grow.YT.Views.363
    @Grow.YT.Views.363 24 дні тому

    This channel gets better and better day by day

    • @PaddyMaddy26
      @PaddyMaddy26 24 дні тому

      Thank you so much for your kind words! We really appreciate your support and are constantly working to improve and provide great content for our viewers. Stay tuned for more exciting updates and videos!

  • @RahulThakur-ix3up
    @RahulThakur-ix3up 24 дні тому

    Plz add more videos

    • @PaddyMaddy26
      @PaddyMaddy26 24 дні тому

      Dear RahulThakur-ix3up, Thank you for your feedback and suggestion. We are always looking for ways to improve and provide valuable content for our viewers. We will definitely take your request into consideration and work on adding more videos in the future. Thank you for supporting our channel and stay tuned for more updates. Best regards, Paddymaddy

  • @happyshoppi1036
    @happyshoppi1036 25 днів тому

    HI Paddy thanks for sharing this Information. I would appreciate if you can share us the lastest excel sheet in github as this is 3 yrs older if you are having it please share it..

    • @PaddyMaddy26
      @PaddyMaddy26 25 днів тому

      Sure give me some time will surely update it

    • @PaddyMaddy26
      @PaddyMaddy26 25 днів тому

      Hello happyshoppi1036, thank you for your comment. I apologize for the outdated excel sheet, I will work on updating it and sharing the latest version on our GitHub repository. I appreciate your interest and I will make sure to keep you informed once the updated excel sheet is available. Thank you for your attention to detail.

  • @Siva-xq1qd
    @Siva-xq1qd 28 днів тому

    Yes... Highly appreciate your effort. One suggestion, please disable or change the animation and annoying bell sound. It will be very helpful. Your content is amazing.

    • @PaddyMaddy26
      @PaddyMaddy26 28 днів тому

      Thank you for your feedback, Siva-xq1qd! I will definitely take your suggestion into consideration and work on disabling or changing the animation and bell sound in future videos. I'm glad you enjoy the content, and I appreciate your support. Thank you for watching!