www.petervanderwoude.nl Open in urlscan Pro
2001:678:76c:3760::31  Public Scan

Submitted URL: http://petervanderwoude.nl/
Effective URL: https://www.petervanderwoude.nl/
Submission: On May 09 via api from GB — Scanned from NL

Form analysis 4 forms found in the DOM

GET https://www.petervanderwoude.nl/

<form method="get" class="search-form navigation-search" action="https://www.petervanderwoude.nl/">
  <input type="search" class="search-field" value="" name="s" title="Search">
</form>

POST #

<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-3">
  <div id="subscribe-text">
    <p>Provide your email address to subscribe to updates on this blog.</p>
  </div>
  <div class="jetpack-subscribe-count">
    <p> Join 818 other subscribers </p>
  </div>
  <p id="subscribe-email">
    <label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-3"> Email address </label>
    <input type="email" name="email" required="required" value="" id="subscribe-field-blog_subscription-3" placeholder="Email address">
  </p>
  <p id="subscribe-submit">
    <input type="hidden" name="action" value="subscribe">
    <input type="hidden" name="source" value="https://www.petervanderwoude.nl/">
    <input type="hidden" name="sub-type" value="widget">
    <input type="hidden" name="redirect_fragment" value="subscribe-blog-blog_subscription-3">
    <button type="submit" class="wp-block-button__link" name="jetpack_subscriptions_widget"> Subscribe </button>
  </p>
</form>

POST

<form method="post">
  <input type="submit" value="Close and accept" class="accept">
</form>

POST /

<form action="/" method="post">
  <label for="target_email">Send to Email Address</label>
  <input type="email" name="target_email" id="target_email" value="">
  <label for="source_name">Your Name</label>
  <input type="text" name="source_name" id="source_name" value="">
  <label for="source_email">Your Email Address</label>
  <input type="email" name="source_email" id="source_email" value="">
  <input type="text" id="jetpack-source_f_name" name="source_f_name" class="input" value="" size="25" autocomplete="off" title="This field is for validation and should not be changed">
  <img style="float: right; display: none" class="loading" src="https://www.petervanderwoude.nl/wordpress/wp-content/plugins/jetpack/modules/sharedaddy/images/loading.gif" alt="loading" width="16" height="16">
  <input type="submit" value="Send Email" class="sharing_send">
  <a rel="nofollow" href="#cancel" class="sharing_cancel" role="button">Cancel</a>
  <div class="errors errors-1" style="display: none;"> Post was not sent - check your email addresses! </div>
  <div class="errors errors-2" style="display: none;"> Email check failed, please try again </div>
  <div class="errors errors-3" style="display: none;"> Sorry, your blog cannot share posts by email. </div>
</form>

Text Content

Skip to content


ALL ABOUT MICROSOFT ENDPOINT MANAGER

Peter blogs about Configuration Manager, Microsoft Intune and more


Menu
 * Home
 * Scripts
 * Archive
 * Contact
 * About
 * 
 * 
 * 
 * 
 * 


PROTECTING IMPORTANT FOLDERS WITH CONTROLLED FOLDER ACCESS

April 25, 2022 by Peter van der Woude

This week is all about controlled folder access. Not something particular new,
but something important to be familiar with. Controlled folder access is a great
addition to further minimize the attack surface of Windows devices. It helps
protect the data in the controlled folders from malicious apps and threats, by
checking apps against a list of known, trusted apps. That makes it a perfect
addition to further protect the (corporate) data on Windows devices. That also
makes it mainly a local security feature. To get detailed reporting information,
it can be used with Microsoft Defender for Endpoint. This post will mainly focus
on the local configuration of controlled folder access and the user experience.
Introducing controlled folder access Controlled folder access is a great method
…

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

Leave a comment


FURTHER SIMPLIFYING MANAGEMENT OF THE GOOGLE CHROME BROWSER ON WINDOWS DEVICES

April 18, 2022 by Peter van der Woude

This week is all about further simplifying management of the Google Chrome
browser on Windows devices. The configuration of the Google Chrome browser was
already possible by ingesting ADMX-files, by using PowerShell, or by using
Chrome Browser Cloud Manager, but the IT administrator was always in for a
sub-optimal experience. It was either a lot of work (when looking at
ADMX-files), or it provided limited reporting capabilities (when using
PowerShell), or it was a completely separate solution (Chrome Browser Cloud
Manager). Non of those were optimal. The great thing is that with the latest
service release of Microsoft Intune (2203), the Settings Catalog (and the
Administrative Templates) now also include settings for the Google Chrome
browser. That enables the IT administrator to simply use the …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

2 Comments


FREEZING THE INSTALL OF SYSTEM UPDATES ON ANDROID ENTERPRISE CORPORATE-OWNED
DEVICES

April 11, 2022 by Peter van der Woude

This week is all about a very recent new introduced feature for Android
Enterprise corporate-owned devices. That feature is the ability to freeze the
install of system updates for a period of time. Freezing system updates on
Android Enterprise corporate-owned devices enables organizations to stick to a
specific version of Android for the specified period of time. That can be
usefull to get the right support of the vendor of an app, or to make sure that a
specific app works with the latest verison of Android. That level of control
makes Android more and more enterprise ready, without the need of additional
management tooling (OEMConfig). This post will start with a quick introduction
to the freeze period for system updates, followed with the steps …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

2 Comments


EXCLUDING REMOVABLE USB-DRIVES FROM AUTOMATIC ENCRYPTION

April 4, 2022 by Peter van der Woude

This week a short blog post to address a scenario that’s been challenging for a
while. That scenario is around removable USB-drives and automatic encryption.
When organizations have configured that removable drives require encryption,
that introduces challenges with storage built into specialized devices like
video cameras, voice recorders, conferencing systems, medical devices and many
more. That would also require that type of storage to be required, when read
access wasn’t sufficient. That, however, would often cause more problems than
solutions. To address that challenge, Microsoft has introduced a new policy.
That policy can be used to create an exclusion list of devices for which the
user will not be prompted for encryption. Even when encryption of removable
drives is required. This post will introduce that …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

Leave a comment


ALLOWING USERS TO OPT-IN FOR WINDOWS INSIDER PREVIEW BUILDS

March 28, 2022 by Peter van der Woude

This week is all about providing users with a method to deliberately opt-in for
running Windows Insider Preview Builds. That option to opt-in is created by
using an access package. That makes this post basically a combination between an
earlier post about allowing users to opt-in for Windows 11 and an earlier post
about managing Windows Insider Preview Builds. By default, many organizations
prevent users from simply enabling and using Windows Insider Preview Builds.
Often the main reason is to prevent unpredicted and unwanted issues from
happening on the devices of users. Using an access package makes sure that the
user consciously chooses to use Windows Insider Preview Builds, possibly in
combination with the approval of a manager and in combination with sharing
information in …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

Leave a comment


USING UPDATE STATUS AS PART OF THE COMPLIANCE OF WINDOWS DEVICES

March 21, 2022March 21, 2022 by Peter van der Woude

This week is focused on the update status of Windows devices. More specifically,
this week is focused on making sure that Windows devices can only be compliant
when running the latest cumulative update. Within a device compliance policy, it
was already possible to specify a specific Windows version. That, however, is a
manual action. Over and over again. That can be achieved easier nowadays. A few
months ago I wrote about working with custom compliance settings. That enables
the ability to add custom scripting to device compliance policies. Custom
scripting basically means that anything is possible. Including the check on the
update status. This post will show how to leverage that functionality with a
small custom script to check for the update status of the …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

2 Comments


SIMPLIFYING REPETITIVE ADMINISTRATIVE TASKS BY USING LOW-CODE SOLUTIONS: AN
OVERVIEW

March 17, 2022March 17, 2022 by Peter van der Woude

This week my post is a few days later, as my post is an extension of the session
of me and Pim Jacobs at the Nordic Virtual Summit Third Edition. At the virtual
summit we did a session about
Simplifying repetitive administrative tasks by using low-code solutions . During
that session we shared information around the basics of low-code solutions and
we provided some nice examples around Microsoft Intune and Azure AD. This post
will provide a quick summary of that session. The slides (PDF) of that session
are available for download here. Closing notes and summary It might sound a bit
weird to start with the closing notes and summary. That, however, is the best
summary of our session, as the biggest part of the session was demo. Besides the
difference in what classifies …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

Leave a comment


TRANSLATING WINDOWS DEFENDER APPLICATION CONTROL POLICY WIZARD SLIDERS TO
WINDOWS DEFENDER APPLICATION CONTROL POLICY OPTIONS

March 7, 2022March 7, 2022 by Peter van der Woude

This week is a short post focussed on Windows Defender Application Control
(WDAC). More specifically, this short post is focussed on the different policy
rules that can be configured by using the Windows Defender Application Control
Policy Wizard. That policy wizard is an an open-source Windows desktop
application written in C# and bundled as an MSIX package. It provides IT
administrators with a user-friendly method for creating, edditing and merging
WDAC policies. The WDAC policy wizard relies on the ConfigCI PowerShell cmdlets
and that makes sure that the output of the policy wizard is identical to using
the cmdlets manually. WDAC is genarally used to control what runs on Windows 10
and Windows 11 devices. That is achieved by setting policies that specify
whether a …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

Leave a comment


USING THE MICROSOFT DEFENDER FOR ENDPOINT APP FOR CONNECTING TO MICROSOFT TUNNEL
GATEWAY

March 7, 2022February 28, 2022 by Peter van der Woude

This week is something completely different, compared to the last couple of
weeks. This week is back to Microsoft Tunnel. Microsoft Tunnel is the VPN
gateway solution for Microsoft Intune that fully integrates with Azure AD (and
Conditional Access) for providing access to on-premises resources on iOS and
Android devices. In the early stages of Microsoft Tunnel, there used to be a
separate Microsoft Tunnel app for iOS and Android devices. One of the challenges
with those devices is that there can only be one active VPN at the same time.
That’s especially challenging when using it in combination with Microsoft
Defender for Endpoint. That makes the combination of both products into a single
app, a logic move. That’s been the case for Android already …

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

3 Comments


GETTING FAMILIAR WITH THE WINDOWS UPDATE FOR BUSINESS DEPLOYMENT SERVICE

February 21, 2022February 21, 2022 by Peter van der Woude

This week is a follow-up on last week. Last week the focus was on getting
started with the Windows Update for Business deployment service and this week is
about getting more familiar with the Windows Update for Business deployment
service. Last week the focus was on getting information and this week the focus
is on adding information. More specifically, this week is about enrolling
devices, creating groups, adding devices to groups, creating feature update
deployments and assigning groups to feature update deployments. In other words,
this week is about creating custom feature update deployments. For the basics of
the Windows Update for Business deployment service have a look at last weeks
post, this post will continue on that information. This post will go through the
…

Read more


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Skype (Opens in new window)
 * Click to email this to a friend (Opens in new window)
 * Click to print (Opens in new window)
 * 

Leave a comment
Post navigation
Older posts
Page1 Page2 … Page54 Next →


AWARD




SUBSCRIBE TO UPDATES

Provide your email address to subscribe to updates on this blog.

Join 818 other subscribers

Email address

Subscribe


ABOUT

I’m Peter van der Woude, born in 1983 and I’m living together with my wife and
two sons in the Netherlands.

I work as a Principal Consultant at InSpark and my main focus is helping
customers in their road to a modern workplace (using Microsoft Endpoint
Manager).


ADVERTISEMENTS



Peter van der WoudeFollow

Enterprise Mobility #MVP | #WIMVP | Modern management @we_are_inspark |
#MSIntune #MEM #MEMpowered | Proud father of TJ and LJ | Happily married with
Marjolein


Retweet on TwitterPeter van der Woude Retweeted
Gabe Frost@bytenerd·
6 May


Let’s invent together #WUfB admins. Other than real-time observation of the WU
log file, what debug info do you want to see logged? @acjuelich @AdamGell
@AdamGrossTX @schenardie @BruceSaaaa @pvanderwoude @bdam555 @NickolajA
@ariaupdated

Reply on Twitter 1522691378320355328Retweet on Twitter 152269137832035532817Like
on Twitter 152269137832035532853Twitter 1522691378320355328
Retweet on TwitterPeter van der Woude Retweeted
MikeDano (preview)@MikeDanoski·
6 May


In development has been posted. Here we go. #MEMpowered

Reply on Twitter 1522524624298328065Retweet on Twitter 152252462429832806548Like
on Twitter 1522524624298328065179Twitter 1522524624298328065
Peter van der Woude@pvanderwoude·
5 May


Mission accomplished! Found this little guy that wanted to show some #MSIntune
#MEMpowered love for https://petervanderwoude.nl2

Peter van der Woude@pvanderwoude

This week no new blog post about #msintune, and no that’s not because of
#mmsmoa. That would have been a great excuse, but the excuse is even better. I
think. Enjoying a vacation with the family and we’re going after some minifigs
this week.

Reply on Twitter 1522239915525906435Retweet on Twitter 1522239915525906435Like
on Twitter 15222399155259064358Twitter 1522239915525906435
Retweet on TwitterPeter van der Woude Retweeted
@rnabmitra@rnabmitra·
3 May


Update Compliance: CommercialID replaces with AAD Tenant ID on Jan 2023

Read about all the changes here:
https://techcommunity.microsoft.com/t5/windows-it-pro-blog/a...

Reply on Twitter 1521566425013497856Retweet on Twitter 15215664250134978566Like
on Twitter 15215664250134978569Twitter 1521566425013497856
Retweet on TwitterPeter van der Woude Retweeted
Intune Support Team@IntuneSuppTeam·
3 May


Based on our #MEMCommunity feedback, we've published new docs to help implement
app protection policies (APP/MAM) settings within your organization!

🔧 Troubleshooting: https://msft.it/6018bEwgy

📁 Resolve common data transfer issues: https://msft.it/6019bEwgJ

#MEM #MSIntune https://twitter.com/IntuneSuppTeam/status/1490747371684188171

Intune Support Team@IntuneSuppTeam

We'd love to get your feedback on the type of additional content you'd like to
see to help implement app protection policies (APP/MAM) settings within your
organization.

Don't see an option listed? Share your 💭🔽

#MEM #MSIntune #MEMpowered

Reply on Twitter 1521595455691440137Retweet on Twitter 152159545569144013711Like
on Twitter 152159545569144013723Twitter 1521595455691440137
Load More...


RECENT POSTS

 * Protecting important folders with controlled folder access
 * Further simplifying management of the Google Chrome browser on Windows
   devices
 * Freezing the install of system updates on Android Enterprise corporate-owned
   devices
 * Excluding removable USB-drives from automatic encryption
 * Allowing users to opt-in for Windows Insider Preview Builds


TAGS

ADFS Android Android Enterprise App Configuration Policies Applications App
Protection Policies Azure AD Co-management Collections Company Portal Compliance
Policy Compliance Settings Conditional Access ConfigMgr ConfigMgr 1511 ConfigMgr
2007 ConfigMgr 2012 Configuration Baseline Configuration Policy Device
Compliance Device configuration Intune Management Extension iOS ipadOS MAM-WE
MDM MEM Microsoft Endpoint Manager Microsoft Graph REST API Microsoft Intune MVP
Office 365 OMA-DM OMA-URI Powershell SCCM Software Updates Task Sequence USMT
4.0 Win32 app Windows 7 Windows 10 Windows 11 Windows AutoPilot Windows Phone
8.1


CALENDAR

May 2022 S M T W T F S 1234567 891011121314 15161718192021 22232425262728 293031
 

« Apr    
© 2009 - 2022 PETER VAN DER WOUDE

petervanderwoude.nl uses cookies to ensure that it provides you the best
experience on this blog. By continuing to use this blog, you agree to their use.
To find out more, including how to control cookies, see here: Cookie policy
Send to Email Address Your Name Your Email Address Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.