<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Mem on Ru Campbell MVP</title>
    <link>https://campbell.scot/tags/mem/</link>
    <description>Recent content in Mem on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Mon, 10 Jul 2023 20:47:03 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/tags/mem/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Microsoft Improves and Simplifies Defender for Endpoint Management Capabilities</title>
      <link>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</link>
      <pubDate>Mon, 10 Jul 2023 20:47:03 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</guid>
      <description>&lt;p&gt;In one of the biggest changes to Microsoft Defender for Endpoint (MDE) in its product history, you no longer need a separate management engine to configure endpoint settings.&lt;/p&gt;
&lt;p&gt;In this blog, we&amp;rsquo;ll look at what that change is, why it was necessary, initial impressions, and what you might want to do next.&lt;/p&gt;
&lt;h2 id=&#34;historic-management-architecture-needed-simplifying&#34;&gt;Historic management architecture needed simplifying&lt;/h2&gt;
&lt;p&gt;MDE (and it&amp;rsquo;s Windows client, Microsoft Defender Antivirus (MDAV)) always stood out from the crowd of endpoint protection platforms as being, well, a bit &lt;em&gt;weird&lt;/em&gt; in terms of management architecture. With most platforms, you get a central admin console which pushes out endpoint settings. Think scan schedules, quarantine rules, exclusions, CPU throttling, etc. MDE/MDAV, on the other hand, instead relied on an external management tool such as Intune (MDM), Configuration Manager, or Group Policy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Update BitLocker Unique Identifiers with Intune</title>
      <link>https://campbell.scot/update-bitlocker-unique-identifiers-with-intune/</link>
      <pubDate>Mon, 22 Mar 2021 18:01:18 +0000</pubDate>
      <guid>https://campbell.scot/update-bitlocker-unique-identifiers-with-intune/</guid>
      <description>&lt;p&gt;BitLocker unique identifiers are values used to identify the ownership of an encrypted volume.  The device that performs the encryption holds the unique identifier and as encryption begins, it also records this against the metadata of that encrypted volume.&lt;/p&gt;
&lt;p&gt;The identifiers are typically used in tandem with the BitLocker removable data-drive setting &lt;strong&gt;write access to devices configured in another organisation&lt;/strong&gt; which, if set to &lt;strong&gt;block&lt;/strong&gt;, will prevent write operations on devices where the unique identifier of the removable drive doesn&amp;rsquo;t match a list of unique identifiers managed on the device.  The idea here is you want to enforce BitLocker on removable drives to improve data loss (encrypted drives, if found, are unreadable without the means to decrypt them), &lt;em&gt;but&lt;/em&gt; you only want them to be encrypted within your organisation: someone can&amp;rsquo;t encrypt their device elsewhere and then copy data to it.  You may want to do this because it means you, as an administrator, would not be able to decrypt it if required.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender Network Protection - Not Enabling via Intune - Troubleshooting &amp; Fix</title>
      <link>https://campbell.scot/microsoft-defender-network-protection-not-enabling-via-intune-troubleshooting-fix/</link>
      <pubDate>Sun, 07 Mar 2021 13:27:29 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-network-protection-not-enabling-via-intune-troubleshooting-fix/</guid>
      <description>&lt;p&gt;When configuring Defender for Endpoint (MDE) customer recently, I ran into a problem when trying to enable network protection.  Network protection is a feature of MDE and Microsoft Defender Antivirus (MDAV) that takes the filtering capabilities of SmartScreen and applies them to all network traffic.  It is a prerequisite for things such as MDE&amp;rsquo;s web content filtering and URL/domain indicators of compromise.&lt;/p&gt;
&lt;p&gt;This blog details the specific problem I had enabling it with Intune (Microsoft Endpoint Manager), and general troubleshooting steps to follow that will help for that problem and hopefully others you may experience.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Use Intune to Manage Microsoft Defender for Endpoint Tags and Device Groups</title>
      <link>https://campbell.scot/use-intune-to-manage-microsoft-defender-for-endpoint-tags-and-device-groups/</link>
      <pubDate>Thu, 11 Feb 2021 21:24:59 +0000</pubDate>
      <guid>https://campbell.scot/use-intune-to-manage-microsoft-defender-for-endpoint-tags-and-device-groups/</guid>
      <description>&lt;p&gt;In &lt;strong&gt;Microsoft Defender for Endpoint&lt;/strong&gt; (MDE), &lt;strong&gt;tags&lt;/strong&gt; can be attached to a device for reporting, filtering, and as a dynamic attribute for membership of a &lt;strong&gt;device&lt;/strong&gt; &lt;strong&gt;group&lt;/strong&gt;.  Device groups (previously machine groups), are used to assign devices different rules and administrative ownership.  A device can only belong to one group and controls settings such as auto-remediation level and which Role-Based Access Control (RBAC) roles have administrative permissions over it.&lt;/p&gt;
&lt;p&gt;While you can assign tags, and therefore determine group membership, manually from the Security Center, this doesn&amp;rsquo;t exactly scale well.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Turn Existing Azure AD Devices into Windows Autopilot Devices</title>
      <link>https://campbell.scot/turn-existing-azure-ad-devices-into-autopilot-devices/</link>
      <pubDate>Sat, 06 Feb 2021 09:19:13 +0000</pubDate>
      <guid>https://campbell.scot/turn-existing-azure-ad-devices-into-autopilot-devices/</guid>
      <description>&lt;p&gt;To provision Windows 10 PCs using Autopilot and Intune, they must first be registered as &lt;strong&gt;Windows Autopilot devices&lt;/strong&gt; in the &lt;strong&gt;Device Directory Service&lt;/strong&gt;, which is really the cloud Autopilot service.  When a device is registered to the Autopilot service, its &lt;strong&gt;hardware hash&lt;/strong&gt; is used to generate a &lt;strong&gt;Zero Touch Device ID&lt;/strong&gt;(ZTDID) - a globally unique identifier for that device based on hardware information such as (but not only) MAC address, disk serial number, and system serial number.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Store BitLocker Recovery Keys in Azure AD for Devices Already Encrypted</title>
      <link>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</link>
      <pubDate>Fri, 15 Jan 2021 18:18:36 +0000</pubDate>
      <guid>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</guid>
      <description>&lt;p&gt;As you move from on-premises or third-party infrastructure to Microsoft 365 and Azure AD, you will want to keep those BitLocker recovery keys safe.  You can store those keys either in on-premises Active Directory or in the cloud with Azure AD.&lt;/p&gt;
&lt;p&gt;The behavior of the BitLocker / Azure AD relationship is that the recovery keys will only be stored against the device object in Azure AD if the encryption happens when the device is already Azure AD or Hybrid Azure AD Joined.  You can then retrieve the recovery keys from the Azure AD portal or Microsoft Endpoint Manager (which really just takes you back to Azure AD&amp;rsquo;s properties for the device).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hybrid Azure AD Join &#43; Intune Enrollment - Prerequisites Checklist and Process Flow</title>
      <link>https://campbell.scot/hybrid-azure-ad-join-intune-enrollment-prerequisites-checklist-and-process-flow/</link>
      <pubDate>Mon, 25 May 2020 17:22:04 +0000</pubDate>
      <guid>https://campbell.scot/hybrid-azure-ad-join-intune-enrollment-prerequisites-checklist-and-process-flow/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m a simple person, and sometimes it just helps to have a checklist to refer to when you&amp;rsquo;re troubleshooting rather than navigating the sparse pages of docs.microsoft.com.  In this blog, I  explain the prerequisites for the Hybrid Azure AD Join (HAADJ) + automatic (GPO controlled) Intune MDM enrollment scenario and the process from start to end, as simply and concisely as I can (not easy!)  There are no screenshots and it&amp;rsquo;s not a click-by-click: this is a quick reference for when you&amp;rsquo;re pulling your hair out wondering what could be stopping you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Connect a Work or School Account - MDM vs. MAM in Self Enrolment</title>
      <link>https://campbell.scot/connect-a-work-or-school-account-mdm-vs-mam-in-self-enrolment/</link>
      <pubDate>Sat, 16 May 2020 06:13:47 +0000</pubDate>
      <guid>https://campbell.scot/connect-a-work-or-school-account-mdm-vs-mam-in-self-enrolment/</guid>
      <description>&lt;p&gt;A Windows 10 user can self-enrol in MDM or MAM from &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Accounts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Access work or school&lt;/strong&gt; &amp;gt; &lt;strong&gt;Connect&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://campbell.scot/wp-content/uploads/2020/05/01-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;What happens next depends on how &lt;strong&gt;Mobility (MDM and MAM)&lt;/strong&gt; is configured in Azure Active Directory and &lt;strong&gt;device ownership&lt;/strong&gt;.  For a personal device, if &lt;strong&gt;user scope&lt;/strong&gt; for both MDM and MAM overlaps for the enrolling user, MAM will win.  The opposite is true of corporate devices. [wptb id=277]&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using Intune to Deploy the Azure Information Protection (AIP) Unified Labeling Client (Win32 MSI)</title>
      <link>https://campbell.scot/using-intune-to-deploy-the-azure-information-protection-aip-unified-labeling-client-win32-msi/</link>
      <pubDate>Sat, 18 Jan 2020 22:47:50 +0000</pubDate>
      <guid>https://campbell.scot/using-intune-to-deploy-the-azure-information-protection-aip-unified-labeling-client-win32-msi/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Unified labels&lt;/strong&gt; refer to a movement whereby &lt;strong&gt;Azure Information Protection (AIP) labels&lt;/strong&gt; are now being replaced by &lt;strong&gt;sensitivity labels&lt;/strong&gt;.  Sensitivity labels offer encryption, watermarks, etc as AIP labels did before them, but are now managed in the new &lt;a href=&#34;https://security.microsoft.com/sensitivity?viewid=sensitivitylabels&#34;&gt;Microsoft 365 Security Centre&lt;/a&gt;, with several other benefits beyond the scope of this post.&lt;/p&gt;
&lt;p&gt;With this change comes a new AIP client, called the &lt;strong&gt;unified labeling client&lt;/strong&gt;, that replaces the old one, now called the &lt;strong&gt;classic client&lt;/strong&gt;.  The AIP unified labeling client will refer to the M365 Security Centre to download labels, but note that (and &amp;lsquo;unified&amp;rsquo; gives this away) labels created on either the old Azure AIP dashboard or new M365 Security Centre will sync to each other after you have enabled unified labeling.  Current guidelines from Microsoft are that, unless you have a &lt;a href=&#34;https://docs.microsoft.com/en-us/azure/information-protection/rms-client/use-client#compare-the-labeling-clients-for-windows-computers&#34;&gt;use case that isn&amp;rsquo;t a feature of the unified labeling client&lt;/a&gt;, this is what you should be installing.  This post holds your hand through a deployment of the client using Intune.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploy Microsoft Store Apps using Intune with Configuration Manager (SCCM) Co-Management (Fix &#39;Not Applicable&#39; Status)</title>
      <link>https://campbell.scot/deploy-microsoft-store-apps-using-intune-with-sccm-co-management-fix-not-applicable-status/</link>
      <pubDate>Fri, 10 Jan 2020 21:00:30 +0000</pubDate>
      <guid>https://campbell.scot/deploy-microsoft-store-apps-using-intune-with-sccm-co-management-fix-not-applicable-status/</guid>
      <description>&lt;p&gt;Intune provides an interface to easily deploy apps from the Microsoft Store to your registered users and devices, but even if you have SCCM (Config Manager) Co-Mangement enabled with the default workloads shifted to Intune in Co-Management properties, there is more to be done.  If you don&amp;rsquo;t follow these steps, you will receive the status of &lt;strong&gt;Not applicable&lt;/strong&gt; in the Intune client apps user and device install status pages.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;00.-Not-Applicable-in-Intune&#34; loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/00.-not-applicable-in-intune.png&#34;&gt;&lt;strong&gt;Prerequisite:&lt;/strong&gt; This only works with SCCM 1806+.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
