Understanding Azure Active Directory Conditional Access

In this Ask the Admin, I’ll look at why user authentication isn’t enough in a cloud-first, mobile-first world and how Azure AD conditional access works with cloud apps and on premises Windows Server Active Directory.

The post Understanding Azure Active Directory Conditional Access appeared first on Petri.

Continue reading Understanding Azure Active Directory Conditional Access

iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known

India-linked highly targeted mobile malware campaign, first unveiled two weeks ago, has been found to be part of a broader campaign targeting multiple platforms, including windows devices and possibly Android as well.

As reported in our previous artic… Continue reading iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known

Hackers Used Malicious MDM Solution to Spy On ‘Highly Targeted’ iPhone Users

Security researchers have uncovered a “highly targeted” mobile malware campaign that has been operating since August 2015 and found spying on 13 selected iPhones in India.

The attackers, who are also believed to be operating from India, were found abu… Continue reading Hackers Used Malicious MDM Solution to Spy On ‘Highly Targeted’ iPhone Users

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work… Continue reading Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Set Group Policies without Microsoft® Active Directory®

IT admins often wonder if it’s possible to set group policies without Microsoft® Active Directory® (AD). Well, we should point out that Group Policy Objects (GPOs) are a unique feature…
The post Set Group Policies without Microsoft&#1… Continue reading Set Group Policies without Microsoft® Active Directory®

Axonius wants to help businesses manage all of their devices; raises $4M seed round

 Axonius wants to help enterprises manage their fast-growing number of mobile, compute and IoT devices that now use their networks and in the cloud. The idea here is to provide these companies with a single platform that allows them to see which d… Continue reading Axonius wants to help businesses manage all of their devices; raises $4M seed round

Role-Based Access Control Comes to Intune

In this Ask the Admin, Russell Smith looks at how Microsoft’s Role-Based Access Control can help you manage administrator access to its Mobile Device Management service.

The post Role-Based Access Control Comes to Intune appeared first on Petri.

Continue reading Role-Based Access Control Comes to Intune