Speaker

Maurice Daly

Maurice Daly

Principal Cloud Architect, CloudWay | Microsoft Security MVP

Dublin, Ireland

Actions

Maurice has been working in the IT industry for the past 25 years. His focus is around the areas of Windows deployment, device management, Azure AD and secure productivity, Maurice has been an MCSE since 2008 and was awarded his first MVP award in the area of Enterprise Mobility (now Security) in March 2017.

Most recently his focus has been on automation of deployment tasks, creating and sharing PowerShell scripts and other content to help others streamline their deployment processes.

Awards

Area of Expertise

  • Information & Communications Technology

Topics

  • Endpoint Manager
  • Microsoft Endpoint Manager
  • Microsoft Endpoint Configuration Manager
  • Microsoft Defender for Endpoint
  • Endpoint Analytics
  • Endpoint Security
  • defender for endpoint
  • Client and Endpoint Management
  • Intune
  • Microsoft Intune
  • Kusto Query Language
  • PowerShell
  • Log Analytics
  • OSD
  • mobile device management

10 Expert Tips for Windows Autopilot Success with Intune

Unlock the secrets to a smooth Windows Autopilot deployment with Intune by exploring 10 essential tips derived from real-world experiences. Discover common pitfalls to avoid and practical strategies to ensure users have a seamless first logon experience. Dive into troubleshooting techniques to keep your Autopilot setup running smoothly in production environments.

Windows Enrollment Options - Deep Dive

Onboarding Windows devices into Entra is just a case of a license, Autopilot or OOBE, and an identity, right? In reality though there is way more to this, and what about security?

Join us for a deep dive session on the different enrollment types with Windows, how licensing and things like MDM scope come into play. When used in the context of security we will show you how to leverage the different join states in your conditional access policy design, and help you realise that trying to block device registration is not the right starting path in your security strategy when it comes to Windows.

Shutting down ConfigMgr - What did we do about imaging?

It’s a reality today that many organisations find themselves at a point where device management is purely cloud based, delivered through Microsoft Intune.

This has been an incredibly quick transition, and one that although brought its own challenges, most of which are now overcome… except for one of course. What happens when we need to image a device, perhaps due to faulty hardware, or just to get the machine squeaky clean before being handed out for Autopilot enrolment.

in this session we will talk about how this was overcome for a global organisation with over 120k endpoints, giving real world experience of how this reality was achieved, allowing for the switch off of Configuration Manager, and an OS deployment solution that can be used anywhere, with just an internet connection.

Join us for a journey into PowerShell, WinPE, Azure storage, key vault, and function apps, in an automation project that literally delivers.

So we turned on MFA for everyone. We must be safe now, right?

We have heard about MFA being the golden state for quite some time now, but is that enough in 2024? You probably heard about both passkeys and phishing resistant authentication by now, but what does that really mean? And what role does device compliance play in this story?

In this session you will learn how to to protect both your standard users and the privileged accounts in Entra ID.

Join in on a journey from password strategies, authentication methods, identity protection, privileged identity management, conditional access and the journey to a password-less world.

Don’t think, just DO - A Delivery Optimization Deep Dive

With more and more organisations adopting a cloud first model for application and update deployment, something has to be considered.. that being how does this impact the network.

Whether you have a love or hate relationship with the network team, or worse still, you are the 'network team', having control of bandwidth is vital to ensure quality of service. With the adoption of cloud services this has never been more important.

So come and join us for a session that will show you the right path to DO success, and how to monitor what’s going on in your environment.

Intune Automation Magic

In this session we will look at how to leverage Azure automation, Graph API, and good old PowerShell to give Intune an extra bit of oomph, and a sprinkle of wow.

Intune as a platform has matured massively over the past 5 years, but for those of us who are coming from a Configuration Manager background, the want, and desire to do more within the product can be frustrating. The beauty of Intune though is the ability to interact with it, through the Graph API, and in fact you do this on a daily basis without even realising it.

In this session, we will dig into how to leverage Graph, and automation functions within Azure, to well beyond the native capabilities, using scripts to automate many different scenarios, with the only limit typically being your imagination. In this session we will look at real world examples of how these automation additions are used.

Intune Reporting with KQL & PowerBI

For admins coming from a Configuration Manager world, one common theme of feedback is that Intune does not provide sufficient reports.

In this session we will look at what we can get natively out of Intune, but more importantly, how we can go beyond native. Beyond native of course requires scripting, and here we will look at how to leverage PowerShell, Log Analytics, KQL and PowerBI to extract the data that is important for you, and render it in what we believe to be a truly awesome way.

This demo rich session will provide practical examples and scripts, so even if you have a degree in "borrowing code", you too will have something you can build upon on return to the office.

Advanced Device & Application Management in Intune

If you are managing devices through Microsoft Intune and find yourself constantly using the portal, or relying on traditional methods of pushing applications, settings and more through hybrid, then this session will help you question this approach.

We will take you through how to use PowerShell and Microsoft Graph to automate and ensure that you have a documented by code method to performing even the most mundane of tasks. This will help you streamline your admin processes and ensure that teams undertake management in a standardised manner.

From enforcement of BitLocker recovery keys in a Configuration Manager to Intune migrated scenario, to renewing certificates and even converting, uploading and creating Win32 applications on the fly.

BitLocker Cloud Management & CloudBAM

BitLocker quickly became the preferred encryption solutions for many organisations, and of course this makes sense. But what about those migrating from on-premises, storage of recovery keys, which MDM policy to opt for, and how to replace MBAM.

In this session we will take you through moving your key recovery out to Azure AD, review native and extend to custom encryption reporting with log analytics, look at all the MDM configuration options, and finally unveil a community developed MBAM alterative / replacement we are calling CloudBAM.

Deploy and manage AppLocker like a pro with Microsoft Intune and Log Analytics

AppLocker has been around for many years, and organisations have traditionally managed this security feature through GPO's. When it comes to cloud managed devices, deployment of the settings, and overall management of this great security tool can be lacking.

Join me and find out how to audit, monitor, and deploy AppLocker in a modern way.

Friends do not let friends do hybrid join

With organizations transitioning workloads to the cloud, there are still a lot of misconceptions around the capabilities of devices in different domain join states. This, for many, is leading them to stick with Hybrid Azure AD Join (HAADJ), due to familiarity and the fear of the unknown. Join Gerry Hampson and Maurice Daly for a demo packed session where we will lead you through a journey from Active Directory joined, to hybrid, and onto fully Azure AD joined, where items such as SMB file share, print, Windows Hello for Business, and web application access will be demonstrated across each join state.

Implementing Modern Management - Consultant notes from the field

Moving into "Modern Management" is an increasingly prevalent request for businesses' IT teams, and often has the same high-level goals: Reducing reliance on on-premises infrastructure, reducing management overhead, and improving user experience and overall security posture. But how well do businesses understand all the relevant pre-requisites and steps in that journey, based off years of consultancy experience?

This session aims to prepare you with common issues faced by businesses when initiating a Modern Management journey, and how to avoid falling into the same traps, based off significant experience as consultants and using real-life examples.

Goodbye GPO!

Say Goodbye to Group Policy and Hello to Intune Device Management! In this session, we'll explore the benefits of migrating from Group Policy to Microsoft Intune, the cloud-based device management solution. We'll discuss how to prepare for the migration, what to expect during the migration process, and how to manage your devices after the migration is complete. We'll also cover common challenges and pitfalls to avoid when making the switch.

Getting started with Intune: Policies, Apps and Workarounds

If you are making the switch from traditional management you are of course familiar with Active Directory, Group Policy and application deployment tools. So how in the modern management work do we accomplish the same goals? What do we do when the in-console settings do not provide all the settings we were familiar with?

In this session we will take a look at where and how to use MDM & CSP policies, how to deploy applications, and how to work around perceived shortcomings to ensure you have full control in the modern world.

Intune, Graph & Azure - Automation 101

Join Maurice Daly for a session that takes three separate components that admins use on a daily basis, these being Intune, Azure and Graph, and how to get these working together to help automate the mundane, or monitor on the abnormal.

You don’t need to be a scripting superhero, or graph geek, as they will step you through the types of automation that can be achieved.

At the end of this session, you’ll be full of what’s possible, and have insight into what consultants are implementing in the real world for customers who want to go beyond the built-in.

Maintaining BIOS & Drivers updates with Intune for real

Traditional ConfigMgr admins have grown up with tight control measures to allow them to deploy driver and BIOS packages. The move to modern management with MS Intune has made this tasks more challenging.

With MS Intune you can use Windows Update for Business or utilize OEM software to keep your estate up to date. The main issue with this is that you loose control and the opportunity to perform thorough testing before you release it to your clients.

In this session you will learn about all the options using native options in Intune to maintain your drivers and BIOS. You will also learn about how to use OEM and community tools together to apply complete control over when a BIOS or Driver update is being deployed to your end user devices.

Migrating to the M365 platform

As many organisations embrace the M365 license due to consolidation of their O365 and Windows licensing, the full scale of what you can migrate often gets overlooked.

Join Enterprise Mobility MVP Maurice Daly for a real world driven session as to how to leverage all features within your M365 license to secure and empower your end users through features in Azure Active Directory, Office 365 and Intune.

Areas covered:
Doing security the right way
Migrating data to OneDrive
Managing enterprise devices

Our favorite community tools

This session will cover and discuss various top quality community tools across different technologies.

Proactive Remediations Deep Dive

With the addition of proactive remediations , organisations now have the ability to perform compliance item/baseline type jobs across all Windows managed devices.

In this session we will look at the underlying components, how to trace the running of the detection and remediation script, registry values, and how to extend logging for your own scripts.

We will also look at examples of how this awesome addition to your endpoint arsenal can benefit the admin, as well as the reports analysts.

The Log Analytics of MEM!

Are you moving some or all of your management workloads to Intune? Are you missing your good old configmgr logs? Then this is the session for you. Microsoft Endpoint Managers cloud reporting framework is based on Azure Log Analytics, and there is a whole new world of possibilities that has just come our way. We will look into how you can use log data to build automation, alerting and monitoring of your environment and incidents. With this you can audit all changes in changes in your environment and do automation based desired state configuration in the cloud. We will should how you can build your own workbook dashboard with the data YOU care about? What about combining data from both on-premises and the cloud and visualise it all in one place?

The World According To Endpoint Analytics

Endpoint analytics brings valuable information from your endpoints, direct to you the Endpoint admin.

Understand about why your devices are being powered down, the performance deltas between different builds of Windows 10, and most cool of all, using Proactive Remediation's to script your own solutions to gather information, apply fixes, and more.

The Scary Truth: Default Tenant Security

For many organisations, moving to Microsoft 365 is a given these days. The lure of collaboration, simple(ish) licensing, and built in security checks all the boxes. Unfortunately just because it is in the cloud, and you have security features, doesn't mean they are enabled or enforced in an effective way.

In this session we will take you through the top security related considerations when it comes to hardening default out of the box Entra ID environments. From applications, to groups, to conditional access, all of which can be used and leverage as a grounds of attack, so know understand the risks, and how to mitigate against them.

At the end of this session you will be forewarned and forearmed to deal with the fires within your tenant that you did not know were there.

Troubleshooting Autopilot Failures - Deep Dive

Windows Autopilot provides a great solution for provisioning todays in a modern way, but what happens when things go wrong?

In this session we will do a deep dive into the what and where to look when your autopilot deployments fail, all of which of course based on real world experience deploying machines at mass.

Workplace Ninjas Denmark User group Sessionize Event

November 2024

MMS 2024 Flamingo Edition Sessionize Event

October 2024 Fort Lauderdale, Florida, United States

Workplace Ninja Summit 2024 Sessionize Event

September 2024 Luzern, Switzerland

Cloud Technology Townhall Tallinn 2024 Sessionize Event

February 2024 Tallinn, Estonia

Workplace Ninja Summit 2023 Sessionize Event

September 2023 Baden, Switzerland

NIC X Edition Sessionize Event

June 2022 Oslo, Norway

Nordic Virtual Summit 3rd Edition Sessionize Event

March 2022

Nordic Virtual Summit Second Edition Sessionize Event

November 2021

WorkPlace Ninja Virtual Edition 2021 Sessionize Event

August 2021

ExpertsLive Norway 2021 Sessionize Event

May 2021 Oslo, Norway

Nordic Virtual Summit Sessionize Event

February 2021

WorkPlace Ninja Virtual Edition 2020 Sessionize Event

August 2020 Kloten, Switzerland

Evolve Conference 2019 Sessionize Event

October 2019 Birmingham, United Kingdom

Experts Live Norway 2019 Sessionize Event

May 2019 Oslo, Norway

Maurice Daly

Principal Cloud Architect, CloudWay | Microsoft Security MVP

Dublin, Ireland

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top