Quick blog post here explaining an Intune remediation to fix devices where they do not activate via a subscription. If your device looks like this then you don’t need to follow this guide If for any reason you have Not active in the subscription, this could mean that the CLIP Service store has become corrupt […]
Author: Nick Brown
Senior M365 Developer and Architect @ Jisc Cloud Solutions.
Find me on twitter @techienickb
Reminder: PSTN end of life in 2025
Openreach are in the progress of moving all customers from the old analogue public switched telephone network (PSTN) to a fully digital network: Openreach puts the stopper on copper | Openreach – this means no more ISDN or analog copper lines, fiber is the way forward. As of September 2023, Openreach are only provide digital […]
Road to Cyber Essentials: Android
This is the 8th part of my Road to CE series, in this post we’ll look at Android and fully managing Android. Microsoft + Android MDM is a lot easier than Apple, that’ll be coming up in the next post. Initial Setup First follow the instructions on Connect your Intune account to your Managed Google […]
Road to Cyber Essentials: iOS
This is the 9th part of my Road to CE series, in this post we’ll look at iOS and fully managing iOS (iPhone/iPads), we’ll cover MacOS briefly as well for the initial setup, but MacOS will be a future post. Sadly Apple MDM in Intune isn’t as fluid as Android, but we’ll go through it. […]
This is the 7th part of my blog series on the Road to CE series. In today’s post we’ll look at Defender for Identity and Azure Identity Protection to assist with Cyber Essentials. One big area in Cyber Essentials is monitoring and removing access when a compromise occurs, Microsoft has tools built into Azure AD […]
Welcome to the 6th in the Road to CE series, this time we’re going to talk about Winget and the new application deployment methods in Intune. Winget and the new Store deployment method are a key pillar in CE, ensuring apps are up to date. This post was partially written with Bing Chat Compose. What […]
This is the 5th part of my blog series on the Road to CE series. We’ll be starting to look at using Excel to generate the report you need for Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. In sections of your Cyber Essentials you need include a list of Devices, […]
This is the 4th part of my blog series on the Road to CE series. We’ll be starting to look at the technical controls inside of AAD and Intune to assist with Cyber Essentials. Please note I’ll be specifically talking about AAD and Intune. As previous stated under Cyber Essentials you need to know the […]
This is the third in the Road to CE series, we’ll be talking about the written policies need to support Cyber Essentials, most of these will just be updates to existing policies. TLDR: Review and update your policies to enshrine the technical controls and accommodate for technical control feature lackings. If you don’t have an […]
Road to Cyber Essentials: The Pilot
This is the second in the Road to CE series of blog posts following Jisc’s full Cyber Essentials journey. In this part of our journey, we had a meeting with senior stakeholders as well as our IT Security teams, explored the requirements for Cyber Essentials and how best to achieve those for Jisc and scoping […]