As of Windows 11, we noticed that we were getting prompted to continue connecting to a network that we’d never had a problem with before. It’s already defined in group policy, so this new behavior is puzzling and annoying. The certificate in question is for the NPS/Radius server our network uses to validate credentials for the wifi. Continue Connecting I really had no idea how to even begin googling for this problem, but while talking to some of my fellow nerds on the Winadmins Discord server, tossing around some ideas on what could be causing this, looking to see whether there was a problem with the certificate, etc.
Intro So you’ve started rolling out Windows 11 to your endpoints, and your users got confused and upset over the consumer teams apps that is installed? Understandably you wish to do something about this. (╯°□°）╯︵ ┻━┻ No worries mate, Intune Proactive Remediations to the rescue! The Solution The code below fixes two things. It removes the chat by writing the registry key that disables it the TaskbarMn DWORD controls this Then it simply uninstalls the appx package for the consumer teams app, note that this has no effect on the regular teams app.
Hey Siri, Write A Blog Post For Me THE CONTENTS IN THIS POST IS EXPIRED, DO NOT USE THIS ANYMORE This method of installing the Configuration Manager Client during Autopilot is no longer needed Please use the new autopilot into co-management feature. Autopilot into Co-Management Overview Installing the SCCM Client During Autopilot EXPIRED CONTENT BELOW Deploying the Configuration manager client is usually pretty simple. the procedure is well documented. However there are issues if you plan on installing the CM client during Autopilot using the officially suggested methods
I found several posts about configuring Diagnostic Settings on VMs, but none that specified or included boot diagnostics. With this Azure Policy you can automatically enable Boot Diagnostics and apply a storage account to it. This is also a great base if you want to start testing out your own policies. 1. Overview Our process will have several major parts Create a Custom Azure Policy Definition Assign to a Subscription or Resource Group Find the Blob Storage URI to use Create a Remediation task to Apply the changes Optional: Link to GitHub for versioning 2.
I had a need in my home lab to quickly deploy a bunch of thin clones of Ubuntu’s cloud image. I chose to use the cloud images Ubuntu provides instead of building a custom template. Xen Orchestra has had support for cloud-init since 2015. Quick Walkthrough Here is the short version of how this works: Download the current 20.04 ubuntu cloud image OVA file, there should only be 1 on each build’s page.
As you may have noticed by now, there doesn’t seem to be any nice built in way to set environmental variables in intune 🙁 The Problem Setting a user environmental variable using powershell is an easy task to accomplish, you basically just run the following: 1 Set-ItemProperty -Path HKCU:\Environment -Name temp -Value "c:\temp\" This works just fine, but won’t take effect until the user either reboots or signs into the device again.
So you have already figured out how to dynamically generated outlook signatures, but now you want to make sure that people actually use them. but without preventing the use of other signatures your users might have. Well it just so happens that I have a solution for you! No default signature has been set To do all this, we create a new Proactive Remediation in Intune. Add the detection and remediations scripts from below, and set it to run as the user.
Have you ever looked at a report on a Portal Page and wanted to know just WHERE the data just came from? Well you can - and finding the information can be so easy. Read on below to see how. Introduction Take for example this report on a Proactive Remediation. I used one of the built in Proactive Remediations for the example, but it could easily be one of our other Proactive Remediation posts, like Dynamic Outlook Signatures, Building VPN Connections, or Repairing Folder permissions.
Introduction In this post, I’ll show you a workaround to get device based wireless authentication working for AADJ Windows devices via NPS. Keep in mind this is a workaround and your mileage may vary. Background NPS does not play nice when it comes to AADJ device authentication. There is a fantastic writeup on this issue here. The tl;dr of the issue Device based authentication works when there is a computer object in your on-prem.
Hello, This is a long and overdue update on a solution I started working on last year to allow my organization to use the modern driver management solution without the need of the custom webservice. I also wanted the solution to use the built-in task sequence steps as much as possible to allow other administrators to customize the solution to their need without the need to go modify a big PowerShell script.