Enroll Android Enterprise dedicated devices into Azure AD Shared device mode

By: Charlotte Maguire | Program Manager – Microsoft Endpoint Manager – Intune & Shantaram Punukollu | Sr Program Manager – Identity
 
Updated 4/30/2021 for general availability 
 
Microsoft Endpoint Manager – Intune now supports auto… Continue reading Enroll Android Enterprise dedicated devices into Azure AD Shared device mode

April in HLS – Power BI, Microsoft Teams Rooms, Confessions of Health Geeks, and More

 
Welcome to the monthly Healthcare and Life Sciences blog recap, April edition! Check out the highlights below:
 
Power BI

Ingest Healthcare Open Data into Azure and Power BI using New GitHub Repository: Greg Beaumont, Microsoft Senior Int… Continue reading April in HLS – Power BI, Microsoft Teams Rooms, Confessions of Health Geeks, and More

Customer Offerings: Microsoft Endpoint Manager – Update Compliance Dashboard

 
Introduction
As Microsoft Endpoint Manager Configuration Manager Engineers we have always been asked by Business or IT Managers to accurately report on the Software Updates currently deployed in our environments. This could be as easy as just d… Continue reading Customer Offerings: Microsoft Endpoint Manager – Update Compliance Dashboard

Center for Threat-Informed Defense teams up with Microsoft, partners to build the ATT&CK® for Containers matrix

Microsoft is happy to have contributed and worked closely with the Center for Threat-Informed Defense and other partners to develop the MITRE ATT&CK® for Containers matrix.
The post Center for Threat-Informed Defense teams up with Microsoft, partn… Continue reading Center for Threat-Informed Defense teams up with Microsoft, partners to build the ATT&CK® for Containers matrix

Configuring BitLocker encryption with Endpoint security

By Luke Ramsdale – Service Engineer | Microsoft Endpoint Manager – Intune
 
Administrators often work with a variety of devices—newer devices equipped with the trusted platform module (TPM) or older devices and virtual machines (VMs) without TPM. … Continue reading Configuring BitLocker encryption with Endpoint security