CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
Create Entra ID Dynamic Group using Extension Attribute

Create Entra ID Dynamic Group using Extension Attribute

by CPI Staff | Sep 3, 2024 | Blog, Entra ID

This Entra ID blog post will show how to create an Entra ID dynamic group using an extension attribute. In our previous Entra ID blog post, we showed how to create a custom extension attribute using Entra ID using Graph API, which is the first step if you want to...
Create Entra ID Dynamic Group using Extension Attribute

Create a Custom Extension Attribute Entra ID

by CPI Staff | Aug 26, 2024 | Blog, Entra ID, Graph API, Graph Explorer

This Entra ID blog post will explain how to create a custom extension attribute in Entra ID, similar to the classic Extension Attributes in the Windows Server Active Directory. Table of contentsListen to this articleWhat Are Extention AttributesCreate a Custom...
Create a Naming Policy for Microsoft 365 Groups

Create a Naming Policy for Microsoft 365 Groups

by CPI Staff | Aug 21, 2024 | Blog, Entra ID, Microsoft 365

This Microsoft 365 Entra ID post will explain how to Create a Naming Policy for Microsoft 365 Groups. Table of contentsRequirementsAttributesCreate a Naming Policy for Microsoft 365 GroupsApply Microsoft 365 Naming PolicyMore Articles on the topic Microsoft 365 group...
Streamlining Entra ID App Registrations with Azure Bicep

Streamlining Entra ID App Registrations with Azure Bicep

by CPI Staff | Jul 29, 2024 | Azure, Bicep, Blog, Entra ID

In this Azure Bicep and Entra ID, we will show you how to create an Entra ID App Registration using Azure Bicep. Entra ID (formerly Azure Active Directory) is Microsoft’s Azure and Microsoft 355 authentication and authorization service, handling all login events...
Next Entries »

Recent Posts

  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune