azure tutorial for beginners
#paddyMaddy #azuretutorial #azuretraining #intune
azure training
Complete Azure training
Complete SCCM training
Compute Intune training
Microsoft azure training
azure tutorial for beginners
#SCCM #ConfigMgr #Windows10 #Intune #EMS #Mobile #DeviceManagement
#AZUREAD
#AZURE
#AWS
#CLOUD
Microsoft SCCM Guides
SCCM Install Guide
SCCM Step By Step Guide
SCCM Current Branch Install
#Microsoft SCCM Guides
#Installing Microsoft SCCM
#Installing SCCM
#Install SCCM
#SCCM Install Guide
#SCCM Step By Step Guide
#SCCM Current Branch Install
#SCCM Prerequisites
#SCCM Install Prerequisites
#intune
#msintune
Azure Training in Telugu lo
Cloud Deployment, #PaddyMaddy, cloud Computing,azure tutorial,microsoft azure tutorial for beginners,azure for beginners,azure basics,microsoft azure training
Microsoft,Intune,Training,Azure,SCCM,AutoPilot,ConfigMgr,Windows,Cloud,MEM,MSIntune,MEMIntune
www.paddymaddy.com/
Пікірлер
Hi, can I clear the MD-102 exam with this tutorial?
Intune specific Yes..
@@PaddyMaddy26 thanks for the swift reply !!!
Hi KarthiKeyan-vk9ui, thank you for reaching out. While this tutorial can definitely help you prepare for the MD-102 exam, it's important to also supplement your studying with additional resources and practice exams to ensure you are fully prepared. I recommend reviewing the official exam guide and practicing with sample questions to gauge your readiness. Good luck with your exam preparation!
Thank you so much for video I got completed AZ900 with 700 marks ☺️
Thank you for sharing your accomplishment with us! We're glad to hear that our video played a part in helping you successfully complete the AZ900 exam. Congratulations on achieving such an impressive score of 700 marks! Keep up the great work and best of luck with your future endeavors in the field of Azure.
anna ppt send chey anna preparetion kee esy gaa vuntundhi
GitHub.com/Paddymaddy/az900
You will find here 👍
@@PaddyMaddy26 tq anna
Nice explanation, however too much ads on it was a distraction
Thank you for your feedback, Victorafiesimama9221. We appreciate your thoughts on the amount of ads in the video and will take it into consideration for future content. Your input is valuable to us as we strive to improve the viewing experience for our audience. Thank you for watching and sharing your opinion.
thanks!
Thank you for taking the time to leave a comment, ClintGamree. I appreciate your feedback and support. If you have any more questions or suggestions, feel free to let me know.
If u share document and it will more happy
Thank you for your comment! I appreciate your feedback and will consider sharing additional resources or documents in future videos. I hope you continue to enjoy the content on my channel. Thank you for watching!
Thanks for the video! Can you please make a video on disabling Bluetooth for data sharing instead of blocking audio devices and keyboards?
Hi @sudhirreddy6253, thank you for your suggestion! I appreciate your feedback and will definitely consider making a video on disabling Bluetooth for data sharing in the future. Stay tuned for more content on this topic!
Did you tried class based I have explained in this same video… try class based
Hi Paddy, please could you share the virtual labs link? I would like to follow through with you while watching your video. Just wanted to say great work, really appreciate it. 👍🏻
Hello Sumit147601, thank you for your support and kind words. I'm glad you found the video helpful. Unfortunately, I do not have a virtual labs link to share at the moment. However, I recommend searching online for reputable sources that offer virtual labs for further experimentation. Thank you again for your interest and encouragement. Have a great day! 👍🏻
Fantastic walk-through.
Thank you for your kind words, we're glad you enjoyed our walkthrough! If you have any suggestions or feedback for future videos, feel free to let us know. And don't forget to like, subscribe, and hit the notification bell for more content. Thanks again for watching!
How to Block All USB Sticks Except Company Approved USB Sticks with Microsoft Intune and Defender for Endpoint Step-by-step, Post any question as a new Comment to get a response in less than 10 minutes, try once.
Check another video for allow only company USB Drives... kzread.info/dash/bejne/imR-tMhrYd2xoqw.html
Hello, thank you for your suggestion. I will definitely check out the video you recommended for allowing only company USB drives. Thank you for sharing this information.
superb, everyone should know about the Intune who have experience in O365, patching & restriction over internet. It is easy to understand the concept of Inutine and use case. excellent dear paddy Maddy.
Thank you so much for your kind words! I completely agree that Intune is a valuable tool for those with experience in O365, patching, and internet restriction. It's great to hear that you found the concept of Intune and its use cases easy to understand. If you have any questions or need further clarification on anything related to Intune, feel free to reach out. Thank you for watching!
New web
Hello, thank you for your comment. Could you please clarify what you mean by "new web"? I would be happy to provide more information or assistance if needed.
@@PaddyMaddy26 dmsa useful
Hi paddy we are planning to entra hybrid join our devices at present our devices are domain joined+intune enrolled(entra registered) .so for entra hybrid join we allowed 4 urls in firewall and proxy.when we run test device reg connectivity.ps1 in test devices it shows sometimes success and sometimes failure.but when we telnet the urls in cmd communication is successfull.what to do
Hello srinivasnaidu173, Thank you for reaching out to us about your issue with hybrid join for your devices. It's great that you have already allowed the necessary URLs in your firewall and proxy settings. It's strange that the test device registration connectivity script is showing inconsistent results. Since you mentioned that communication is successful when using telnet in the command prompt, it seems that the issue might not be with the network connectivity. I would recommend checking the configuration settings on the devices, as well as any potential conflicts with the domain join and Intune enrollment. Additionally, make sure that all required certificates are properly installed on the devices. If the issue persists, I suggest reaching out to our technical support team for further assistance. They can provide more detailed troubleshooting steps to help resolve the problem. Thank you for bringing this to our attention, and we appreciate your patience as we work on finding a solution. Best regards, Paddymaddy
how to unionstall edge browser on android device. we deployed edge browser through android apps. Is it possible pls let me know
Hi @srich9382, thank you for reaching out. Unfortunately, as of now, Microsoft Edge browser is not officially supported on Android devices. It may be possible to install it through unofficial means, but we recommend using browsers that are specifically optimized for Android devices to ensure a smooth browsing experience. If you have any other questions or concerns, feel free to ask. Thank you.
@@PaddyMaddy26 I want to expert intune. i want to join a course online. pls let me know when will u start the calls. not udemy.
Paddy Maddy, really helpful, thanks for the effort you put in.
Thank you for your kind words, I'm glad to hear that you found the content helpful. I appreciate your recognition of the effort I put into creating these videos. If you have any more questions or topics you'd like me to cover, feel free to let me know. Thank you for watching!
Thank you❤
Hi Mohammadkarvani6913, thank you so much for your kind words and support! ❤️ I appreciate you taking the time to leave a comment. If you have any questions or need any further assistance, feel free to reach out. Have a great day!
@@PaddyMaddy26I have no questions at the moment. Thankful
When you any questions please post as a new comment you will get a response within 10 minutes round the clock… it’s my SLA to respond to all new comments…Thank you
Sir please Can you make videos on Azure DevOPS Azure Kubernetes With practical examples I’m in a very problematic situation in my project, I joined my company as an Azure Engineer but since the project was already completed so we are just in the project to support and do some minor changes. The market demands for Azure DevOPS, IAAC, Kubernetes. Since this current project does not offer any such thing I’m just stuck here and looking forward for some easy tutorials on these topics. Your videos have helped me in cracking interviews when I had almost 0 exp in azure, so it’s a humble request to you to cover on these topics. It will be really helpful to people like us who are stuck in support projects and want to move to development and migration projects.
Hello Jello_o, Thank you for your suggestion. I will definitely consider creating videos on Azure DevOps and Azure Kubernetes with practical examples in the future. Stay tuned for more content on these topics! Best regards, Paddymaddy
@@PaddyMaddy26Thank you so much sir
Hi bro DP 900 CERTIFICATE CHEYYALLI CAN U HELP ME THAT WHICH LINK I HAVE TO USED
Hi Reddy Garu, What help you need ?
Hi sir i need personal training fast track. Is any classes will start soon?
I am not teaching online .. I have posted in KZread and Udemy
Hi. thank you for the great video. Is it possible to hire you to help us with the Azure Virtual Desktop?
You can book a FREE consulting slot to understand your requirements from my calendar paddymaddy.setmore.com/paddymaddy
Hi Aniyahudi, thank you for watching the video and for your interest in our services. We would be happy to discuss the possibility of working with you to help with Azure Virtual Desktop. Please feel free to reach out to us via paddymaddy.setmore.com/paddymaddy to discuss further details and potential collaboration. Thank you!
Such a informative video for beginners. Nice One.
Thank you for your positive feedback! I'm glad you found the video informative for beginners. Please let me know if you have any questions or if there is anything else you would like to learn about.
It worked😀 🙌🏻…Thank you so much for taking your time to make this video. I really appreciate your efforts👍🏻. Currently it is working as expected with blocking only usb drive and allowing mouse/keyboards, i will try to add exclusion for some particular devices then will see how it behave.
Thank you for your feedback, TechNerd202! I'm glad to hear that the video was helpful and that the solution is working as expected for you. Good luck with adding exclusions for specific devices and feel free to reach out if you have any further questions. Your support and appreciation mean a lot to me. Thank you! 👍🏻
Your contents are solid & commercially useful.
Thank you so much for your kind words! I'm glad to hear that you find my content valuable and commercially useful. It's always motivating to receive positive feedback like yours. I appreciate you taking the time to leave a comment. If you have any suggestions for future content or topics you'd like to see covered, feel free to let me know. Thanks again for your support!
I just whittled down to 2 words after watching this video : "Thank you!"
Thank you for your kind words! I'm glad you enjoyed the video. If you have any suggestions for future content, feel free to let me know.
Too long of a titles makes me not want to watch the video change that man
Thank you for your feedback, we appreciate your input. We will take your suggestion into consideration for future videos. Thank you for watching and for your support.
Hi Pavan, thanks for the video 👍, i have a question not related to this topic, could not find your playlist so i am posting it here. I want to block USB access for windows devices either from Intune or Defender for Endpoint but allow the basic USB devices like Mouse and Keyboards to work. I have tried creating policy from Configuration Profile (Administrative Template) and from Device Control (ASR) but nothing seems to work the way it should be. As per the MS documents it is simple but in practical it is not working. Either it is blocking all USB or Allowing all. I have gone through many youtube video but could not find a easy and best way which work. Have you tried this scenario and did it work, if not then could you add this to your list as it will be very helpful for others as well, since this is the basic requirement of every organization which is using Defender for Endpoint but achieving the desired result seems quite difficult.
Hi there! Thank you for reaching out and sharing your experience with trying to block USB access for Windows devices. I understand how frustrating it can be when the functionality doesn't work as expected, despite following the official documentation. I haven't personally tried this specific scenario myself, but I can definitely look into it further and see if I can provide any helpful tips or solutions. It's important to find a way to achieve the desired result, especially for organizations using Defender for Endpoint. I appreciate your suggestion to add this topic to my list for future videos, as it could certainly benefit others facing similar challenges. Thank you for bringing this to my attention, and I'll do my best to assist in any way I can. Feel free to let me know if you have any specific questions or details that may help me better understand the issue you're facing. Thank you!
@@PaddyMaddy26 thanks 🙂
Do you need to block all or allow all based on Security groups ?… if this is required I can make a video as I have done this many times… But what’s challenging is a specific to a usb white list is not working these are in preview at this time
@@PaddyMaddy26 currently the requirement is to block usb access to all users but keyboard/mouse should work. If possible then we can have a exclusion group to give permission to particular user or department. We dont have a requirement to whitelist any usb device. Only thing is mouse and keyboard should work. We have both ME3 and ME5 licens
@user-mi4qq1sh2m it’s a easy one.. give me few hours to share a video it’s Saturday I can make a video for you..
Can I have these slides We will pay for that These are large videos Takes more time to complete If the PPT are in handy ...we can access easily
Hello @mallicse568, thank you for your interest in our slides. Unfortunately, we do not offer them for purchase at this time. However, we appreciate your offer to pay for them and will take it into consideration for future offerings. Thank you for understanding.
Great video
Thank you so much for your kind words! I'm glad you enjoyed the video. If you have any suggestions for future content, feel free to let me know. Thanks for watching!
no longer correct
Hello Bud_51, thank you for sharing your thoughts. I appreciate your input on the topic. However, it seems like the information may be outdated or no longer correct. It's always important to double-check and verify facts before drawing any conclusions. Thank you for your comment.
@@PaddyMaddy26 The facts are: this method no longer works! I'm not an idiot (Windows 11 Pro 23H2)
I already configured it but will see if i did it correctly
Hi @user-mi4qq1sh2m, it's great that you took the initiative to configure it yourself. If you have any doubts or need assistance, feel free to reach out for help. Remember to double-check your settings to ensure they are correct. Good luck!
సార్, Intune aap మన ఫోన్ మొత్తాన్ని access చేస్తుందా., photos, whatssaap, fb, contacts లాంటివి intune control లో ఉంటాయా..??
Hello ravitejaraviteja3860, Thank you for your question. Yes, Intune allows you to have control over your device and access to various applications and features such as photos, WhatsApp, Facebook, and contacts. You can manage and secure your device, applications, and data with Intune to ensure a safe and productive experience. If you have any further questions or need assistance with using Intune, please feel free to reach out. Thank you.
లేదు ఓక వేల ఫోన్ Company owned ఐతే అప్లికేషన్స్ కంట్రోల్ లో ఉంటవి…. Personally owned devices always will have control by You
Thank you so much sir, ఈ మద్య కొత్త కంపెనీ లో join అయ్యాను, intune portal download చేసి, అన్ని permissions ఇవ్వవలిసి వచ్చింది. అందువల్ల ఈ డౌట్ వచ్చింది.
@ravitejaraviteja3860 ok np all the very best to your new job
@@PaddyMaddy26 Thank you sir
How the risk level is detected as high, medium,low in identity protection
Hi @keerthanak7841, The risk level in identity protection is typically detected based on the likelihood of unauthorized access to personal information and the potential impact it could have on an individual. Factors such as the strength of passwords, the security of online accounts, the frequency of data breaches, and the precautions taken by individuals to protect their personal information all play a role in determining the risk level. Various tools and software are available to help assess and monitor the risk level, providing alerts and recommendations for improving security measures. It's important to regularly review and update security measures to minimize the risk of identity theft and fraud. I hope this helps clarify how the risk level is detected in identity protection. Let me know if you have any further questions.
Thanks for the video
@Sudhirreddy6253 You're welcome! I'm glad you enjoyed the video. Let me know if you have any questions or if there's anything else you'd like to see in future videos. Thanks for watching!
Hi Pavan, i got stuck with one situation and need your guidance in solving it. We have our own .apk file for android devices, these are custom in-house developed applications, i want to deploy the application to Android Fully Managed devices (Since the device belongs to company). I did it before with publishing them to google play store as a private app but now the size is the problem as it exceed 200MB, so i cannot use this option. I tried with deploying them as Line of Business application but its been 2 days nothing shows on device and even in intune portal it neither failed or success. Question: How to deploy your custom .apk files to android fully managed devices if the file size se more than 200MB? Appreciate your advice and guidance on this matter as i got stuck here from last one week.
Hello there, Thank you for reaching out with your question. It sounds like you are facing a challenge with deploying your custom .apk files to Android Fully Managed devices due to the file size exceeding 200MB. One possible solution to this issue could be to split your .apk file into smaller chunks and deploy them separately. This way, you can stay within the file size limit and still have your application successfully deployed to the devices. Additionally, I recommend checking the Intune portal settings to ensure that the deployment process is properly configured and all necessary permissions are in place. Sometimes, a simple configuration error can cause delays in the deployment process. If you continue to experience difficulties with deploying your application, I suggest reaching out to the Microsoft Intune support team for further assistance. They should be able to provide more in-depth guidance and help troubleshoot any issues you may be facing. I hope this information helps and you are able to successfully deploy your custom .apk files to Android Fully Managed devices. Please let me know if you have any further questions or need additional assistance. Best of luck!
@@PaddyMaddy26 thanks for your quick response, i did check with the application team to reduce the file size or split it but as per them it will be very difficult for them to manage that. Configuration settings look ok as there is nothing much for deploy LOB apps, just upload the .apk file and assign it to group. I think need to open a case with Microsoft to get their feedback in this scenario. I though may be someone must have come across this type of requirement. Appreciate your guidance!
Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail
Hello @keerthanak7841, thank you for your question regarding the workflow for identity protection and the various aspects involved such as detection, investigation, remediation, and policy framing. Identity protection involves a multi-faceted approach to safeguarding user identities and data. 1. Detection: The detection process involves monitoring user activity and behavior in order to identify any suspicious or unauthorized access attempts. This can include monitoring login locations, times, and devices used for authentication. 2. Investigation: Once suspicious activity is detected, an investigation is initiated to determine the extent of the security breach and assess any potential damage. This may involve performing forensic analysis, reviewing logs, and conducting interviews with affected users. 3. Remediation: After the investigation is completed, appropriate remediation steps are taken to mitigate the security threat and prevent future breaches. This can include revoking access to compromised accounts, resetting passwords, and implementing additional security measures. 4. Policy Framing: Policies are essential in defining the rules and guidelines for identity protection within an organization. These policies outline the responsibilities of users, administrators, and security teams in maintaining a secure environment. Conditional access policies and device compliance are important components of identity protection. Conditional access policies allow organizations to control access to resources based on specific conditions such as user location, device type, and security posture. Device compliance ensures that only authorized and secure devices are allowed to access organizational resources. I hope this explanation helps clarify the workflow for identity protection and the significance of detection, investigation, remediation, and policy framing in maintaining a secure environment. If you have any further questions or require additional information, please feel free to ask. Thank you!
Hello sir I’m getting bellow error while imaging dell latitude 7430 laptop with win11. 0x80070002 apply operating system en-us . Contact administrator. And Sccm admin asking me to collect logs from affected system using winpe how to do that. Many thanks in adavance
Hello RameshYadav-ke5bl, I'm sorry to hear that you are experiencing an error while imaging the Dell Latitude 7430 laptop with Windows 11. The error code 0x80070002 typically indicates a problem with applying the operating system. It's great that your SCCM administrator has asked you to collect logs from the affected system using WinPE. To collect logs from the affected system using WinPE, you can follow these steps: 1. Boot the affected laptop into WinPE. 2. Once in WinPE, open a command prompt. 3. Use the command line tools in WinPE to navigate to the directory where the logs are stored. 4. Copy the logs to a USB drive or network location for analysis by your SCCM administrator. If you encounter any specific issues or need further assistance, please don't hesitate to reach out. I hope this helps resolve your imaging issue. Thank you for reaching out and good luck with troubleshooting. Best regards, Paddymaddy
Thanks.Helpfull
Hi muraleekurup3056, thank you for your comment. I am glad that you found the video helpful. If you have any more questions or need further assistance, feel free to ask. Thank you for watching!
00:00 Introduction 00:30 What is Windows LAPS? 01:30 Licensing Requirements 02:30 Supported Operating Systems 03:30 LAPS Architecture Overview 05:00 Using Microsoft Intune 06:00 IT Admin Responsibilities 07:00 Group Policy Alternatives 08:00 High-Level Steps Overview 09:30 Step 1: Enable Microsoft Entra 10:30 Step 2: Enable Built-in Admin Account 12:00 Step 3: Create Intune Policies 13:00 Assigning LAPS Policies 13:30 Demo: Retrieve and Rotate Passwords 15:00 Entra Portal Configuration 17:00 Intune Policy for Built-in Admin Account 19:30 Troubleshooting Policy Errors 22:00 Configuring Password Complexity 25:00 Checking Event Logs 27:00 Verifying Admin Account Status 28:00 Configuring LAPS Policy in Intune 30:00 Conclusion
Struggling to manage local admin passwords on your Windows endpoints?