• IaC Journey continues 2022 (Bicep)
    ,

    IaC Journey continues 2022 (Bicep)

    With previous practice using JSON template and reading up on IaC through colleagues of mine, I decided the next step is testing Bicep. I started this series of blogs with the naked truth of my coding journey from 2004 to 2022, I recommend reading it here as this is follow-my-journey from that post. Bicep is […]

    Read more
  • Windows 365 in Azure Activity logs?

    Windows 365 in Azure Activity logs?

    How does the activity log look like for the resource group hosting the Virtual Network you have connected Windows 365 to? Anything out of the ordinary? As written about here, I have a Windows 365 policy connecting Cloud-PCs to an Azure Virtual Network, and Windows 365 keeps making changes caught by the audit logs in […]

    Read more
  • Ruff journey into IaC (2004-2022)
    ,

    Ruff journey into IaC (2004-2022)

    This is my journey into Infrastructure as Code, and let me tell you, it is still an ongoing journey. A long time ago, back in 2004, I started as a sysadmin apprentice working with on-premises Microsoft Enterprise technology. Troubleshooted some batch-script and made some minor Powershell-scripts on my way, but it was 95% click-ops. January […]

    Read more
  • Recover a lot of files from Recycle bin
    ,

    Recover a lot of files from Recycle bin

    Teams Files uses a SharePoint Recycle bin, because it stores files in a Library, but the web interface to manage the recycle bin isn’t very helpful. If someone by mistake or perhaps trying to delete a folder they synced, have deleted a lot of files, it is a nightmare to restore using the web interface. […]

    Read more
  • Endpoint Vulnerabilities has left the menu?

    Endpoint Vulnerabilities has left the menu?

    When I operate Microsoft 365 Security, I use security.microsoft.com portal for the overview and reporting. Usually I am assigned the Security Administrator, and sometimes I help the team in Endpoint Manager. So I was also assigned Intune Administrator. But because these are roles I need to elevate, I don’t have them active at all the […]

    Read more
  • Security awareness month of the year (October)
    , , ,

    Security awareness month of the year (October)

    October, the nationwide security month of the year. A month we use to share security knowledge internally and externally. Following USA and EUs information security organ (ENISA) yearly security month we take extra responsibility to increase security awareness and protection. Therefore, we come together and deliver free security related presentations in October. People working in […]

    Read more
  • Up your presentation game in Teams (Cameo)
    ,

    Up your presentation game in Teams (Cameo)

    Simple tools to up your game in Teams presentations, here are some quick tips and tricks that I use when holding presentations in Teams. This first option has been around a while, and its called Standout. It will increase your interaction with the participants if they can see your expressions during your presentation. It is […]

    Read more
  • Windows 365 as Jump Host to Azure?

    Windows 365 as Jump Host to Azure?

    Connect your Windows 365 Cloud PC to a Azure Virtual Network? When talking to IT Pros about Windows 365, we often discuss Windows 365 as a jump host for privileged users. And it does increase security to have strict configured desktop, when you access services with extra privileges. The desktop will less likely be infected […]

    Read more
  • From PowerShell to Azure AD License Assignment

    Starting a new Azure AD tenant today, it is easy to take in Azure AD License Assignment, perhaps even using dynamic groups to automate license assignment for different Roles in your organization. But before we had License Assignment in Azure AD, the method of choice was a PowerShell Script running in a Schedule Task. This […]

    Read more
  • How to configure DevOps with Lighthouse

    Peering virtual networks between two tenants using IaC/ARM? Or any other task requiring you to login into multiple tenants during deployment, but want to automate it without having credentials in the script or any other local solution for encrypting credentials? Want to deploy everything with templates from DevOps, but each task in a pipeline only connects to […]

    Read more

Ehlo!

I am Roy Apalnes, a Microsoft Cloud Evangelist working av Sopra Steria. Main focus in Microsoft Security and Endpoint Management, with a bigger picture in mind.

Featured Posts