Step-By-Step: Allowing or Preventing Domain Users From Joining Workstations to the Domain

By default, an Active Directory domain environment allows any authenticated domain user the ability to add workstations to said domain 10 times. With that being said, there may come a time and organization may require to increase or decrease this limit.  An example of this would be an authenticated user bringing their personal Surface Pro…


Mobility Management: Preparing An Intune Environment

Intune, Microsoft’s full-featured Mobile Device Management offering that supports Android, iOS, and Windows, can integrate with System Center Configuration Manager enabling larger environments. This combination can utilize a centralized management console to manage mobile devices, PCs, servers, and virtual machines, both in cloud and on-premise.  A Microsoft Intune subscription is required before preparing the Intune…


Step-By-Step: App Deployment via Microsoft Intune

Microsoft Intune, part of Microsoft’s EMS offering, enables cloud based mobile device management, mobile application management, and PC management. Organizations can utilize Intune to provide supported users access to corporate applications, data, and resources from virtually anywhere on almost any device securely.  Intune also provides the ability to push required applications to devices managed by…

1

BYOD Basics: Enabling Android in the Workplace via the Azure Authenticator App

   Enabling Android in the workplace has always been a challenge for most IT Professionals.  Aside from the advancements made by certain OEMs in regards to security, fragmentation of the OS offering is ailment most cannot solve.  Coupled with Microsoft Intune or other MDM software, some piece of mind can be achieved. Do remember however…

0

Step-By-Step: Creating a Windows Server 2012 R2 Work Folders Test Lab

Microsoft's Enterprise Mobility Solution (EMS) allows organizations to enable its employees to achieve secure access to company apps and data on any of their devices in any location, Work Folders, introduced in Windows Server 2012 R2, furthers that enablement as it allows an organization's users to their work related files on the devices configured, regardless if the device is joined…

1

Step-By-Step: Enrolling iOS Devices Via Apple Configurator In Microsoft Intune

With the introduction of iOS into the workforce, IT professionals faced the dilemma of securing said devices.  Devices running iOS have traditionally been introduced in BYOD scenarios, however as of late, some organizations have now introduced corporately purchased iOS devices to perform certain functionality. The question on managing said devices still however remains. Microsoft Intune,…

0

Device Management Strategy Planning: More Questions Than Answers

  Within the last few years, while in meeting discussing a Mobile Device Management (MDM) strategies, I have been frequently told the following by clientele when inquiring about business requirements:  “I want to be able to do all my tasks on my iPad that I currently do on my desktop.” The request itself spikes after every winter…

0

Top 4 Windows 10 Useful Hidden Features and Hotkeys

With the holidays now over and the 2015 Consumer Electronic Show in full swing, its that magical time of year for all IT Professionals to begin to field questions regarding new and upcoming devices. Whether said devices were recently unwrapped or are still on the CES showroom floor, boundless amounts of questions usually come forth…

0

Mobility Solutions: Enabling Workplace Join Via PowerShell

Workplace join is a great secure enabler of devices that traditionally cannot join a organizations domain. Provisioned as a self-service tool, Workplace join securely joins devices running iOS, Android and of course Windows to an organization’s Windows Server 2012 R2 domain to access network specific resources.  Those who have attended the #CANITPRO Mobility Camp or have…

0

Device Management Strategy Planning: Defining the Opportunity

To this day, many organizations still struggle with regards to device management strategy. While email security is still a top priority, businesses are attempting to do more with these devices to further enable their employees. This post series entitled “Device Management Strategy Planning” will endeavour to provide a planning framework in regards to device management…

0