Recent Posts

Intune app protection policy report

1 minute read

App protection (also called MAM) policies have been around for a couple of years within MEM and I already used them in various projects to protect company da...

Have you considered TPM key attestation?

4 minute read

Device and user-based certificates are commonly used for secure authentication for services like: MECM in HTTPS mode, Always On VPN, 802.1x for (wireless) LA...