Tag: Step by Step
All
All Latest
How to Reset Intune in Windows When Policies Stop Applying
When IME gets into a confused state, a targeted cache-and-log wipe is often faster than a...
Read MoreMicrosoft Cloud PKI: How to Ditch Your On-Prem CA for Intune-Managed Devices
If you’ve spent time maintaining a traditional ADCS stack for Intune certificate delivery — a root...
Read MoreSecurity Copilot in Intune is GA – Here’s What It Actually Does
Security Copilot in Intune reached general availability in July 2025, and since then it’s been one...
Read MoreWindows Quality Updates During Autopilot: The ESP Setting You Need to Know About
One of the more quietly significant changes to land in Intune recently is a new Enrollment Status...
Read MoreHow to Add Microsoft Azure Blob Storage as an Object Repository
To add Microsoft Azure Blob Storage as an object repository without immutability, you normally integrate the Azure Blob Storage service to store and manage objects without enforcing retention or immutability requirements.
Read MoreHow to upgrade Veeam Backup Enterprise Manager to v12.1.2.172
Veeam released the Backup & Replication v12.1.2.172 on May 21, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.1.2.172 build.
How to upgrade Veeam Backup and Replication to v12.1.2.172
Veeam released the Backup & Replication v12.1.2.172 on May 21, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.1.2.172 build.
How to fix Veeam backup error-host is either not a cluster or has its cluster services unavailable
Today I am going to show you how to fix Veeam backup failed and showed host is either not a cluster or has its cluster services unavailable error message.
Read MoreMigrate Physical Machine to Microsoft Failover Cluster
Let’s walk through the steps to perform a Physical to Virtual machine (P2V) conversion using Veeam Backup and Replication (VBR) to migrate a physical server to a Cluster virtual machine.
Read MoreHow to create custom Safe Attachments policies in Microsoft Defender for Office 365
In Microsoft Defender for Office 365, Safe Attachments is a feature that helps protect your organization from malicious email attachments. It automatically scans email attachments for potential threats, such as malware or viruses, before delivering them to recipients’ mailboxes.
Read MoreHow to use the Microsoft Defender portal to assign Strict preset security policies to users
Strict preset security policies typically refer to predefined rules and guidelines designed to enhance security measures within an organization or system. These policies safeguard sensitive data, prevent unauthorized access, and mitigate potential security threats.
Read MoreMicrosoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains
Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.
Read More
