Showing items from PowerShell

Monitor Intune Managed Device Disk Space with PowerShell

Storage management is a critical aspect of device administration that often gets overlooked until it’s too late. Low disk space can cause application failures, prevent updates from installing, and impact user productivity. For IT administrators managing hundreds or thousands of devices through Microsoft Intune, manually checking disk space on each device is simply not feasible.

Continue Reading

Automate Intune Security Baseline Comparisons with PowerShell

Microsoft Intune’s security baselines are a cornerstone for enforcing consistent security settings across devices. However, as new baselines are released or existing ones are updated, administrators often face the challenge of identifying differences between their current baseline and the new one. This process becomes even more critical when customizations are involved, as highlighted in this Microsoft blog post.

Continue Reading

Deploy initial start menu during Intune enrollment without files

A while ago, I got asked to preconfigure an start menu for end users.
My first approach was deploying a start menu using the settings catalog in Intune. This works great but disadvantage using the settings catalog is that a user has no option to create an own start menu.
The start menu will be overwritten by the Intune policy. That was not the goal for our project.

Continue Reading

Create Intune Configuration for Universal Print Automated

Universal Print is a cloud-based print solution that organizations can use to manage their print infrastructure through the Microsoft 365 cloud. Universal Print can also be managed through Intune.

In this blog post, I show how to create Intune configuration policies based on Universal Print in an automated way.

Continue Reading

Monitor Security Baseline Insights Recommendations

Microsoft has updated their security baselines in Microsoft Intune which you can read in the What is new in Intune. A part of the updates is that Microsoft has added recommended settings based on your organisation. In this blog post, I show how to monitor these recommendations that are part of the security baseline and generate a response when a setting does not met Microsoft’s recommendation.

Continue Reading