Modern Workplace Consultant | Automation Geek

RK Solutions

Deep dives into Microsoft 365, Intune, Entra ID, Conditional Access, PowerShell automation, and Graph API tooling.

PS> Get-ChildItem .\posts\ -Recurse
18 posts
018

InforcerCommunity: A PowerShell Module for the Inforcer REST API

If you use Inforcer to manage Microsoft 365 baselines, alignment scores, and policies across tenants, you already know the value of a single pane of glass for compliance and policy...

017

RKSolutions PowerShell Module

If you manage Microsoft 365 tenants, you already know the value of a single view for enrollment flows, anomalies, admin roles, and license assignment. But automation and scripting often mean......

016
Forgotten Features — Part 5

Forgotten Features Series, Part 5: The Defender Tag Bridge You're Not Using – Custom MDE Tags via Intune

This is the fifth post in a series spotlighting forgotten features (policy) in Microsoft Intune and the broader Microsoft 365 ecosystem. Today, we’re digging into a handy but often ignored......

015

M365 License Assignment Report

Every administrator knows the problem of licenses and their allocation. This is often a drama to get a good overview and to review this periodically. I have run into this...

014
Forgotten Features — Part 4

Forgotten Features Series, Part 4: Beyond Built-In Checks – Intune Custom Compliance Policies

As a Managed Service Provider (MSP), you enforce device compliance with Intune's built-in policies: antivirus running, encryption enabled, OS version current. But your customers have unique...

013
Forgotten Features — Part 3

Forgotten Features Series, Part 3: The Metadata Revolution You're Missing - Custom Security Attributes

As a Managed Service Provider (MSP), you manage dozens or hundreds of customers across multiple tenants, each with different service tiers, billing models, and compliance requirements. Critical...

012
Forgotten Features — Part 2

Forgotten Features Series, Part 2: The Overlooked Control Layer – Administrative Units

Administrative Units in Microsoft Entra ID are one of those features that often fly under the radar - but they can be game-changing for organizations managing large, complex environments. Think...

011
Forgotten Features — Part 1

Forgotten Features Series, Part 1: The Legal Gatekeeper You Aren't Using - Conditional Access - Terms of Use

This blog post demonstrates how to securely enforce organizational compliance and gain explicit, auditable user consent before granting access to sensitive cloud applications. While powerful security...

010

MaesterDiff: Because Comparing Maesters Just Got Twice as Fun!

As Microsoft 365 environments grow in complexity, maintaining security and compliance becomes increasingly challenging. Maester provides excellent testing capabilities for Microsoft 365 security...

009

How to secure your Enterprise Application via PIM

This blog post demonstrates how to securely enable Single Sign-On (SSO) for sensitive enterprise applications. While commonly used for tools like RMM platforms (e.g., NinjaOne, N-Able, Kaseya) or...

008

Streamline Your Git Workflow: (semi)-automated Branch Cleanup with PowerShell

As developers and scripters, our local Git repositories can quickly become cluttered with old, merged, or orphaned branches. This accumulation not only makes it harder to navigate your local branches......

007

'Everyone Gets the Same Toolbox' PowerShell Script

As someone who's spent way too much time troubleshooting "it works on my machine" problems, I got tired of the constant friction that comes from inconsistent development environments. You know...

006

Intune Anomalies Report

Every IT administrator knows the struggle of maintaining a clean and secure Microsoft Intune environment. Devices can fall out of compliance, applications might fail to deploy, and inactive devices...

005

Remote Speedtest in CLI: Easy & Quick Network Troubleshooting

As an IT professional, diagnosing performance issues often starts with ruling out the internet connection. Browser-based speed tests are slow and inconvenient, especially in remote or server-only...

004

Entra ID Admin Roles Report

Every administrator knows the problem of managing roles and permissions. It's often a struggle to get a good overview of who has access to what, and reviewing this periodically can...

003

🚀Introducing ASR Rule Inspector V2

After some incredibly valuable feedback and a few feature requests, the next iteration of the ASR reporting script: ASR Rule Inspector V2.

002

ASR Rules: The Importance of Configuration and Verifying with the 'ASR Rule Inspector'

In today’s evolving threat landscape, cybercriminals continuously exploit vulnerabilities in systems and applications. Attack Surface Reduction (ASR) rules help mitigate these risks by limiting the...

001

Language Packs? I Just Told My Computer to 'Figure It Out.' Apparently, It Did.

Do you know that moment? You've got your Intune environment perfectly set up, Autopilot profiles configured, and you think, 'Yes, worldwide rollout, no problem!' But then... reality hits. Devices...

PS Select-String -Pattern
↑↓navigate open escclose ⌘Ktoggle