Wednesday, December 31, 2025

10 Useful Windows Run Commands (Win + R)

Pressing Windows + R opens the Run dialog box, which lets you quickly launch applications, system tools, and configuration settings. This shortcut is an efficient way to navigate Windows without relying on the Start menu or File Explorer.

Below is a collection of commonly used Run commands and their functions.


System and Administrative Tools

  • cmd – Launches Command Prompt

  • powershell – Opens Windows PowerShell

  • services.msc – Opens the Services console

  • taskmgr – Launches Task Manager

  • msconfig – Opens System Configuration

  • eventvwr – Opens Event Viewer

  • compmgmt.msc – Opens Computer Management

  • regedit – Launches the Registry Editor

  • perfmon – Opens Performance Monitor

  • gpedit.msc – Opens Group Policy Editor (if available)

  • dxdiag – Opens the DirectX Diagnostic Tool

  • cleanmgr – Launches Disk Cleanup

  • diskmgmt.msc – Opens Disk Management

  • sysdm.cpl – Opens System Properties


Networking and Connectivity

  • ncpa.cpl – Opens Network Connections

  • inetcpl.cpl – Opens Internet Options

  • mstsc – Launches Remote Desktop Connection

  • control /name Microsoft.NetworkAndSharingCenter – Opens Network and Sharing Center

  • wf.msc – Opens Windows Defender Firewall with Advanced Security


Control Panel Applets

  • control – Opens the Control Panel

  • appwiz.cpl – Opens Programs and Features

  • powercfg.cpl – Opens Power Options

  • timedate.cpl – Opens Date and Time settings

  • desk.cpl – Opens Display Settings

  • hdwwiz.cpl – Opens Device Manager

  • sysdm.cpl – Opens System Properties


File System and Folder Shortcuts

  • . – Opens the current user’s home directory

  • .. – Opens the parent directory

  • control folders – Opens Folder Options

  • %temp% – Opens the Temporary Files directory

  • shell:startup – Opens the Startup folder

  • shell:sendto – Opens the SendTo folder


System Utilities

  • notepad – Opens Notepad

  • calc – Launches Calculator

  • charmap – Opens Character Map

  • mspaint – Opens Paint

  • snippingtool – Opens the Snipping Tool

  • osk – Opens the On-Screen Keyboard

  • write – Opens WordPad


Other Helpful Commands

  • explorer – Opens File Explorer

  • control printers – Opens Devices and Printers

  • control keyboard – Opens Keyboard settings

  • control mouse – Opens Mouse settings


#Windows
#CommandPrompt




Azure Identity Protection

Azure Active Directory (Azure AD) Identity Protection helps organizations identify, assess, and respond to identity-based security risks. It leverages machine learning, Microsoft threat intelligence, and behavioral analytics to detect suspicious behavior that may indicate compromised accounts or malicious activity.

Identity Protection Policies

1. User Risk Policy

Purpose
Manages risks related to user accounts that are suspected of being compromised.

How It Works

  • Assesses user risk levels based on indicators such as leaked credentials or abnormal behavior.

  • Automatically applies remediation steps to accounts identified as risky.

Actions

  • Require password reset: Users marked with high risk must reset their passwords before continuing access.

Best Practices

  • Assign the policy to all users, excluding service accounts or emergency accounts if required.

  • Regularly review risky users and investigate alerts to resolve issues promptly.


2. Sign-In Risk Policy

Purpose
Protects against risks associated with individual authentication attempts.

How It Works

  • Detects risky sign-ins using signals such as:

    • Impossible travel (logins from geographically distant locations in a short time).

    • Sign-ins from unfamiliar devices or locations.

    • Access attempts from known malicious IP addresses or automated tools.

  • Applies Conditional Access controls based on the detected risk level.

Actions

  • Require multi factor authentication (MFA): Adds an extra verification step for risky sign-ins.

  • Block access: Completely denies access for high-risk sign-in attempts.

Best Practices

  • Require MFA for medium- and high-risk sign-ins.

  • Continuously monitor sign-in data to identify patterns and fine-tune policy settings.


3. MFA Registration Policy

Purpose
Ensures that all users are enrolled in multifactor authentication.

How It Works

  • Prompts users to complete MFA registration during their next sign-in.

  • Enforces MFA enrollment to improve overall account security.

Actions

  • Requires users who are not registered for MFA to complete the setup process.

Best Practices

  • Apply this policy to all users, with special attention to privileged roles such as administrators.

  • Use it alongside Conditional Access policies to consistently enforce MFA across the organization.


#Azure
#IdentityProtection
#AzureAD




Assigning Policies in Microsoft Intune

Microsoft Intune – Day 1

Once you have created an Intune policy and configured its settings, the next essential step is to assign the policy to users or devices so it can be enforced.

Types of Policies That Can Be Assigned in Intune

  • App Protection Policies

  • App Configuration Policies

  • Compliance Policies

  • Conditional Access Policies

  • Device Configuration Profiles

  • Enrollment Policies


How to Assign a Policy in Microsoft Intune

  1. Sign in to the Microsoft Intune admin center.

  2. Go to: Devices → Manage devices → Configuration

  3. Select the policy or profile you want to deploy.

  4. Open Properties, then select Assignments, and choose Edit.

  5. Under Included groups or Excluded groups:

    • Select Add groups to choose Microsoft Entra ID groups, or

    • Select All Users or All Devices to apply the policy broadly.

Important: If All Users or All Devices is selected, you will not be able to add additional Entra ID groups.

  1. Select Review + Save (this step does not apply the policy yet).

  2. Select Save to complete the assignment.

Once saved, the policy is assigned and will be applied the next time devices synchronize with the Intune service.




New Windows 11 method allows skipping the Microsoft Account requirement during OOBE

8 months ago, Microsoft removed the BypassNRO.cmd script from Windows 11 preview builds. This script previously made it easy to bypass the Microsoft Account requirement during setup.

Although the underlying Registry settings still function, applying them became more cumbersome, requiring manual Registry edits or typing commands by hand.

Over the weekend, an X user named Wither OrNot shared a simpler approach to bypass the Microsoft Account requirement, which BleepingComputer has since verified.

During a Windows 11 installation, when you reach the “Let’s connect you to a network” screen, press Shift + F10 to open a Command Prompt.

Updated Windows 11 OOBE bypass steps:

  1. Press Shift + F10

  2. Run: start ms-cxh:localonly

This method works on both Windows 11 Home and Pro editions.

#windows11
#oobe
#bypass




Using ChatGPT to Review Wireshark CSV Exports!

Export a Wireshark packet capture as a CSV and upload it to ChatGPT for review. It almost feels unfair—like bringing in a top-tier network expert who can instantly answer virtually any question about your traffic.




Use remote control during a FaceTime call on iPhone

In a one-on-one FaceTime audio or video call, you can either take control of another person’s screen or let someone you trust control yours. This feature can be used to troubleshoot problems or show how to use an app.

Note: Remote control is not currently supported in the European Union.


Request control of another person’s screen

You can ask to control an iPhone screen that is already being shared with you.

Requirements: Both participants must be using iOS 18 or later.

  1. Open the FaceTime app on your iPhone.

  2. Tap the window displaying the shared screen.

  3. Select the Remote Control option.

Once the other person approves your request, you can tap, swipe, and interact with their screen. You can also use the on-screen keyboard within apps.


Approve a remote control request

Someone can control your screen if they are in your contacts and are using an iPhone or iPad running iOS 18, iPadOS 18, or newer. Additional limitations may apply to help protect privacy and personal data.

When you receive a remote control request in the FaceTime app, tap Allow to approve it.

Warning: A person controlling your screen may be able to open or close apps, adjust settings, remove content, or send messages. Only accept requests from people you fully trust.

Certain actions may be blocked for the remote user, such as changing Apple Account or Face ID settings, making purchases, or wiping the device. Face ID and Touch ID are disabled while remote control is active.

You can continue to interact with your device at any time—your input takes priority over remote actions.


Decline a remote control request

When a remote control request appears in the FaceTime app, tap Don’t Allow. Screen sharing will continue, and the other person can still point out areas by tapping, drawing, or writing on your screen.


End remote control

You can stop remote control whenever you choose:

  • If someone is controlling your screen, tap Stop at the bottom of the screen sharing window.

  • If you are controlling someone else’s screen, tap the Remote Control button at the bottom of the screen sharing window.

Ending the FaceTime call will also stop screen sharing and remote control.









Active Directory (AD) functions as the central control system of a Windows-based environment.

It determines:

• User identities and group membership
• Which workstations and servers are part of the environment
• How authentication and single sign-on work
• What actions users and systems are permitted to take through policies and permissions

When AD is compromised, the impact goes far beyond a single machine. In most cases, an attacker can:

• Change or reset credentials and create additional accounts
• Distribute harmful configurations or software using Group Policy
• Gain access to shared files, databases, email systems, VPNs, and internal applications

Control of AD effectively means control of the entire network.

That’s why, in internal security assessments, AD is the primary target:

• Establish initial access on a system joined to the domain
• Map out users, groups, computers, and applied policies
• Exploit weak configurations such as poorly secured service accounts, legacy protocols, or misconfigured group memberships to reach high-privilege or mission-critical systems

If an internal penetration test barely evaluates Active Directory, it doesn’t reflect the organization’s real risk—it only scratches the surface by testing a few isolated machines.




Coming soon to the SharePoint Admin Center!

A new permissions report that provides detailed insight into which sites a user can access, whether through direct assignments or group membership.

Learn more: https://lnkd.in/es8jMASR




How to Add a New User in Microsoft Intune – Quick Guide

Efficient user management is essential for maintaining a secure and well-structured IT environment. If you are using Microsoft Intune, follow the steps below to add a new user to your organization.

Step 1: Access the Intune Admin Center

Sign in to the Microsoft Intune Admin Center using your administrator account.

Step 2: Open the Users Section

From the left navigation panel, select Users to view the list of existing users within your organization.

Step 3: Create a New User

Click New user at the top of the page. You will see two available options:

  • Create new user for internal employees

  • Invite external user for guest access or partner collaboration

Step 4: Enter User Information

Provide the required details such as the user’s name, username, and assign appropriate roles or licenses as needed.

Step 5: Save and Confirm

Click Create to complete the process. The newly added user will now appear in the Intune user directory.

Best Practice

Always assign the correct roles and review security settings when creating new users to ensure compliance and protect organizational resources.

Screenshots have been included for clearer understanding and improved engagement.

#MicrosoftIntune #EndpointManagement #ITAdmin #CloudManagement #TechTips








Real-World Azure Virtual Desktop Experience

I recently analyzed an intermittent Azure Virtual Desktop (AVD) sign-in issue where a user encountered the message:

“Your session ended because the remote PC was low on memory.”

At first glance, the configuration appeared correct:

  • Session hosts provisioned with 64 GB RAM

  • Policies configured to log off disconnected sessions

  • FSLogix profile cleanup already in place

After reviewing AVD Insights and monitoring host performance metrics, the underlying issue became clear.

Session Density vs. Actual Workload

Even appropriately sized virtual machines can experience memory pressure when:

  • Session limits are configured too aggressively

  • Users run multiple applications simultaneously, such as Outlook, Teams, browsers, and Excel

  • Several users log in during peak usage periods

Key Takeaway

AVD reliability is not determined by VM size alone. It requires realistic session density planning, awareness of memory spikes during user logins, and a balanced approach between cost optimization and user experience.

If you are running Azure Virtual Desktop in a production environment, this is worth reviewing before performance issues begin affecting end users.

#AzureVirtualDesktop #AVD #CloudEngineering #Azure #FSLogix #VDI #RealWorldIT




Common IT Issues and How to Troubleshoot Them

Whether you work in IT support, helpdesk operations, or system administration, strong troubleshooting skills are essential for handling day-to-day technical issues.

Below are some frequently encountered IT problems along with practical steps to resolve them.


1. Slow Computer Performance

A sluggish system can reduce productivity. Try the following steps:

  • Open Task Manager using Ctrl + Shift + Esc

  • Disable unnecessary startup applications

  • Run Disk Cleanup or enable Storage Sense

  • Perform a malware scan using Windows Defender


2. No Internet Connectivity

Network issues are among the most common problems. To troubleshoot:

  • Check that Ethernet cables or Wi-Fi connections are properly connected

  • Run the following commands in Command Prompt:

ipconfig /release ipconfig /renew ipconfig /flushdns
  • Restart the router, modem, and the computer


3. Application Freezing or Crashing

If an application becomes unresponsive:

  • End the process using Task Manager

  • Update or reinstall the affected application

  • Check for pending Windows updates

  • Try running the application in Compatibility Mode


4. Blue Screen of Death (BSOD)

BSOD errors usually indicate driver or hardware problems.

  • Note down the displayed error code

  • Boot the system into Safe Mode

  • Update or reinstall device drivers

  • Run system file repair using:

sfc /scannow

5. Login Problems

If users are unable to sign in:

  • Reset the local account password

  • Boot the system into Safe Mode

  • For domain accounts, verify network connectivity and domain controller availability


6. Windows Update Problems

To fix update-related errors:

  • Run the built-in Windows Update Troubleshooter

  • Clear the update cache by executing the following commands:

net stop wuauserv net stop bits del C:\Windows\SoftwareDistribution\Download\* /s /q net start wuauserv net start bits

Final Notes

Learning and practicing these basic troubleshooting techniques helps you:

  • Resolve issues more quickly

  • Identify root causes with confidence

  • Minimize system downtime

  • Improve overall IT support efficiency

#ITSupport #Helpdesk #Troubleshooting #Windows #TechTips #InformationTechnology #Networking #SysAdmin #ITCareer




How to Resolve Windows Update Failures

Common Causes of Windows Update Issues

  • Damaged or corrupted update cache

  • Unstable or interrupted internet connection

  • Insufficient free disk space

  • Windows Update services not running

  • Corrupted system files

  • Conflicts with antivirus software or VPNs


Solutions (Follow These Steps in Sequence)

1. Restart Your Computer

Do not skip this step. Many update-related errors are resolved after a simple reboot.

2. Verify Internet Connectivity

  • Use a reliable Wi-Fi or wired Ethernet connection

  • Disable any active VPN or proxy

  • Avoid using mobile hotspots during updates

3. Free Up Disk Space

Windows requires at least 10–15 GB of available storage to install updates.
Check disk usage by navigating to:
Settings → System → Storage

4. Run the Windows Update Troubleshooter

  1. Open Settings

  2. Go to System → Troubleshoot → Other troubleshooters

  3. Select Windows Update and click Run

This tool automatically detects and fixes common update problems.

5. Restart Windows Update Services

  1. Press Win + R

  2. Type services.msc and press Enter

  3. Restart the following services:

    • Windows Update

    • Background Intelligent Transfer Service (BITS)

    • Cryptographic Services

6. Clear the Windows Update Cache (Highly Effective)

  1. Press Win + R, type cmd

  2. Press Ctrl + Shift + Enter to open Command Prompt as Administrator

  3. Run the following commands:

net stop wuauserv net stop bits
  1. Open the folder:

C:\Windows\SoftwareDistribution
  1. Delete all files inside this folder

  2. Restart the services by running:

net start wuauserv net start bits

7. Repair System Files

Open Command Prompt as Administrator and run:

sfc /scannow

After it completes, run:

DISM /Online /Cleanup-Image /RestoreHealth

8. Temporarily Disable Antivirus Software

Some third-party antivirus programs can block Windows updates.
Disable the antivirus, install the update, and then re-enable it.

9. Manually Install the Update (Last Option)

  1. Identify the KB number (for example, KB5034123)

  2. Go to the Microsoft Update Catalog

  3. Download and install the update manually


Common Windows Update Error Codes

  • 0x80070002 – Corrupted update files

  • 0x800f081f – Missing or damaged system files

  • 0x8024a205 – Windows Update service problem

  • 0x80070020 – Antivirus or third-party software interference

If Windows updates continue to fail repeatedly, the operating system installation may be damaged.
An in-place upgrade can repair Windows without removing personal files.




Microsoft 365 Retention Policies – Technical Troubleshooting Overview

Retention policies in Microsoft 365 are managed through Microsoft Purview and enforced by workload-level processes such as Exchange Managed Folder Assistant and SharePoint Online timer jobs. These policies apply at the individual item level rather than the mailbox level.

Retention Enforcement Priority

  1. eDiscovery or Litigation Holds

  2. Retention Labels

  3. Retention Policies

  4. User-Initiated Deletion

Higher-priority controls always override lower ones and prevent deletion.

Quick Troubleshooting Checklist

  • Confirm policy scope and applied rules

  • Review hidden holds such as Litigation Hold or eDiscovery cases

  • Verify retention action settings (retain or delete)

  • Manually trigger Managed Folder Assistant using PowerShell:
    Start-ManagedFolderAssistant user@domain.com

  • Allow 24–48 hours for policy synchronization and enforcement

Key Takeaway
When data is not being deleted, it is most often expected behavior due to retention configuration rather than a system fault.

Follow for more Microsoft 365 troubleshooting insights and real-world administrator scenarios.

#MicrosoftPurview #RetentionPolicy #ExchangeOnline #Compliance #M365Admin #PowerShell

How to Carry Out a Complete Factory Reset on a Windows PC/Laptop

Key Points

  • Completed a full factory reset on Windows PCs/Laptops with proper data backup

  • Ensured safe and permanent data removal prior to resetting the system

  • Successfully reinstalled Windows operating system (Windows 10/11)

  • Installed and updated all required device drivers (Chipset, Graphics, Network, Audio)

  • Applied the latest Windows updates and security fixes

  • Set up essential applications (MS Office, web browsers, antivirus, utilities)

  • Improved overall system speed and stability after reset

  • Fixed common software problems such as slow performance, malware, and boot issues

  • Configured the system for both professional and personal usage

Skills Section (Short Keywords)

  • Windows OS Installation

  • PC/Laptop Reset & Recovery

  • Operating System Troubleshooting

  • Driver Setup & Updates

  • System Performance Optimization

  • Data Backup & Restoration

  • Basic IT Support

Successfully performed complete factory reset and Windows reinstallation on PCs/Laptops.
Enhanced system performance, updated drivers, and ensured system security.
Capable of efficiently troubleshooting, maintaining, and optimizing computer systems.

#Windows #ITSupport #SystemReset #PCMaintenance #TechSkills




Monday, December 29, 2025

What is PowerShell?

PowerShell is a robust command-line interface and scripting language created by Microsoft. It enables IT professionals to automate tasks, administer systems, and enhance security across Windows, Azure, Microsoft 365, and server environments.

Core Capabilities:

  • Command-line interface

  • Scripting language

  • Automation framework

What You Can Manage with PowerShell

Windows Operating Systems

  • Services and running processes

  • Registry, firewall, and system settings

  • Drivers, event logs, and scheduled tasks

Active Directory

  • Create, update, and remove user accounts

  • Password resets and account management

  • Organizational units and computer objects

  • Group membership management

  • Bulk user provisioning using CSV files

Microsoft 365 and Exchange Online

  • Mailbox creation and management

  • Distribution group administration

  • License assignment

  • OneDrive management

  • Mailbox access and permissions

  • Conditional Access configuration via Microsoft Graph

Azure Cloud

  • Provision virtual machines, networks, and storage

  • Manage Entra ID (Azure AD) identities

  • Automate resource deployments

  • Monitor and maintain cloud resources

Intune and Endpoint Management

  • Device compliance and configuration policies

  • Application deployment

  • Windows Autopilot management

  • Reporting and log analysis

Server Administration

  • File and print services

  • DNS and DHCP

  • Hyper-V virtualization

  • IIS web services

Automation Use Cases

  • Routine system health checks

  • CPU, memory, and disk utilization reports

  • Backup operations and alerting

  • Scheduled and unattended scripts

Why PowerShell Matters for IAM and Cloud Roles

PowerShell is an essential skill for professionals working in:

  • Identity and Access Management

  • Cloud administration

  • Azure and Entra ID operations

  • Microsoft 365 administration

If your role involves identity management, automation, or cloud services, PowerShell proficiency is critical.

#PowerShell #IdentityAndAccessManagement #Azure #Microsoft365
#ActiveDirectory #EntraID #CloudSecurity #Automation #ITCareers
#SysAdmin #CyberSecurity




Windows 11 25H2 Overview: What to Expect

Windows 11 version 25H2 is now available, though it may feel more incremental than transformative. Many of the features promoted as new were already included in 24H2 and are simply being enabled with this release.

Key highlights include:

  • Removal of PowerShell 2.0 and WMIC

  • Minor user interface refinements and Settings app improvements

  • Security, performance, and stability enhancements behind the scenes

For organizations already running 24H2, the move to 25H2 is considered low risk and may only require a system restart.




SCCM vs. Intune: Why More Organizations Are Adopting Intune

With remote and hybrid work now standard, traditional on-premises device management solutions are no longer meeting modern needs.

SCCM is well suited for:

  • On-premises Windows device management

  • Highly complex or legacy environments

  • Scenarios requiring deep, granular control with significant infrastructure

Why Intune is gaining adoption:

  • Cloud-native architecture with no on-prem servers to manage

  • Cross-platform support for Windows, macOS, iOS, and Android

  • Security-focused design with Conditional Access and compliance policies

  • Simplified management through automation and real-time visibility

  • Native integration with Azure AD and Microsoft 365

Reasons organizations are migrating:

  • Alignment with cloud-first strategies

  • Reduced operational and infrastructure overhead

  • Strong Zero Trust security posture

  • Improved end-user experience

The future of endpoint management is increasingly cloud-based.

#MicrosoftIntune #SCCM #EndpointManagement #CloudComputing #ZeroTrust #Microsoft365 #AzureAD #ModernWorkplace #ITInfrastructure #DigitalTransformation #Windows10 #LearningEveryday




New Microsoft 365 Security Configurations to Review in 2025

Important Microsoft 365 security controls introduced in 2025 that administrators should evaluate and configure.

Recommended to Enable:

  • Baseline Security Mode (BSM)

  • Block direct send in Exchange Online

  • QR code–based authentication in Microsoft 365

  • Screen capture prevention during Microsoft Teams meetings

  • More granular external access controls in Microsoft Teams

  • Enhanced file protection within Microsoft Teams

  • Malicious URL detection for Teams chats and channels

  • Content Security Policy (CSP) in SharePoint Online

  • Data Security Posture Management (DSPM) in Microsoft Purview

  • Knowledge Agent in SharePoint Online

Recommended to Disable:

  • “Chat with anyone” capability in Microsoft Teams

  • Adding personal email accounts in Outlook

  • Automatic archiving in Exchange Online (for select users)

  • Applications and agents created by external publishers

Review these settings in your tenant and adjust them based on your organization’s security requirements.

#M365 #Entra #SharePoint #Teams #IdentitySecurity #DataSecurity #EntraID #CyberSecurity #Exchange #EmailSecurity




Sunday, December 28, 2025

Microsoft Defender for Endpoint: Unified, Built-In Endpoint Protection

Microsoft Defender for Endpoint is embedded directly into the Windows operating system, delivering immediate, built-in protection without requiring extra software, agents, or complicated setup.

As a core component of Microsoft’s end-to-end security framework, Defender for Endpoint connects seamlessly with the wider Microsoft security ecosystem, enabling a consistent and unified approach to threat prevention and response.

Because it is cloud-managed, Defender for Endpoint works closely with Microsoft Intune for mobile device management, making it straightforward for organisations to deploy, configure, and oversee endpoint security policies across all devices from a single central interface.

This close integration supports continuous threat visibility, automated incident response, and proactive remediation across both corporate-owned and bring-your-own-device environments.

With capabilities such as attack surface reduction, endpoint detection and response (EDR), and automated investigation and remediation (AIR), Defender for Endpoint goes beyond detection by actively responding to and containing threats.

By adopting Defender for Endpoint, organisations gain scalable, intelligent, enterprise-level security that evolves with emerging threats, while simplifying management and improving overall operational efficiency.

#MicrosoftSecurity #SecurityArchitecture #Cybersecurity




Making Software Deployment Easier with Microsoft Intune

Deploying applications to many devices doesn’t need to be difficult. Microsoft Intune allows administrators to distribute apps efficiently and track installation progress in real time.

Quick walkthrough:

  • Go to Apps in the Intune Admin Center

  • Choose the application (for example, Google Chrome)

  • Review Device install status and User install status to monitor rollout progress

In this example, Google Chrome was deployed successfully across all targeted devices with no installation failures, indicating a smooth rollout.

Pro tip: Consistent monitoring helps maintain stability and speeds up issue resolution.

#MicrosoftIntune #EndpointManagement #ModernWorkplace #ITAdmin #DeviceManagement




Linux Tip: Simplify Disk Usage Output

Scenario: A server is running low on disk space.

df -h \

| grep -v tmpfs \

| awk '{print $6, $5}' \

| sed 's/%//g'

What this does:

  • Filters out temporary filesystems

  • Shows only the mount point and usage percentage

  • Strips the percent sign for cleaner output

Outcome: An easy-to-read overview of disk usage to quickly spot storage pressure.




Saturday, December 27, 2025

Upcoming Changes to Microsoft 365

Microsoft is introducing major updates in late 2025 and 2026, with a strong focus on AI integration through Copilot, enhanced security via Defender and Purview, new Teams licensing in Microsoft 365, and retiring older features like Publisher (Oct 2026) and the Whiteboard Insert Document tool (Jan 2026). Additional updates include Windows recovery improvements, expanded endpoint management, and centralized admin actions in the Microsoft 365 Admin Center.

Key Themes & Updates

AI & Security

  • Copilot: Becoming central to Microsoft 365 with new security controls in the Admin Center.

  • Defender: Expanded phishing and malware protection included in E3/E5 suites.

  • Purview: Insider Risk Management now covers AI agent governance.

  • Defender Experts: New integrated security service offering.

Microsoft 365 & Teams

  • Licensing: Reintroduction of enterprise suites “with Teams” and “without Teams.”

  • Teams Features: Chat with Anyone via email, new apps in Shared Channels, and admin controls for external collaboration.

  • Admin Tools: Consolidated management of endpoints and security tasks.

Feature Retirements & Changes

  • Microsoft Publisher: Support ends October 2026.

  • Microsoft Whiteboard: Insert Document feature retires January 2026 (use images or Teams instead).

  • Send to Kindle: Retiring from Word in March 2026 (use Amazon’s website).

Windows & Devices

  • Windows Recovery: New tools for faster machine recovery and point-in-time restore.

  • Windows 10: Official support ended October 14, 2025.

Staying Updated

  • Microsoft 365 Roadmap: Track upcoming features and changes.

  • Message Center: Admin Center announcements for official updates.

These changes aim to enhance productivity, strengthen security, and provide more flexibility as Microsoft transitions to an AI-driven ecosystem.




Apple Account-Driven User Enrollment Guide

Set Up Account-Driven Apple User Enrollment for Microsoft Intune. This guide explains how to configure account-driven Apple User Enrollment ...