Category: Technology
-
From Theory to Practice: Using Copilot Agents for IT Incident Resolution
Let’s talk about Copilot agents. We’ll skip the theory and go straight to practice. I strongly believe in the potential of artificial intelligence, but like many organizations, we have struggled to fully unlock its value. In this post, I’d like to share some of our practical findings and lessons learned. The Use Case We…
-
Quick tip ! Defender Actions in MECM
Hello, Long time since our last post , had some holiday, did some work : ) but today I want to share a quick tip with everyone. We recently had an issue in our environment with the Windows Defender component blocking and quarantaining a specific executable for a number of devices. This executable was linked…
-
Teams Live event Q&A
Hi, We were recently involved in the setup of a hybrid event using a rather complex setup. There were multiple locations and camera’s involved , audience on premise and remote , live interpreters and Q & A sessions. Now because of the specific setup we had a combination of different technologies used and the teams…
-
Information Protection Labels
Hello, Everyone is working on improving security in the environment. An important aspect about this is the data security component. Depending on the content of some Office documents you want to imply more strict rules about how / who can access the specific content. Enter the information protection labels , nowaydays part of the…
-
Onedrive files on-demand
Hello, We were recently migrating from onedrive files always available to the files on-demand functionality. During our initial tests we discovered something odd. The setting for files on-demand is configured by a group policy and for testing we target our policy to a specific device group. We also use a configuration baseline to verify if…
-
Microsoft Configuration Baselines
Hello everyone, A bit of a technical deep dive today ! I am a big fan of using Microsoft Endpoint Manager’s Configuration Baselines. Basically it’s a desired state for your clients that you define and depending on the technical options you can remediate if the state is incompliant. This could be for example : checking…