Overview When controlling access to Exchange email, there are generally two ways to go about it: You can allow all devices and then block them after evaluating them. You can[…]
Read more
A Business and Tech Blog by Jun Wong
Overview When controlling access to Exchange email, there are generally two ways to go about it: You can allow all devices and then block them after evaluating them. You can[…]
Read moreIf you have an existing MDM solution and are migrating devices over to Intune, you might notice some EAS records being created. These will be viewable as devices, even if[…]
Read moreLet’s assume that you want to configure an email configuration for an “Android device.” Not Knox, not Android For Work (AFW), just basic “Android.” Look at the picture above. That[…]
Read moreIt’s weird how much of my life is digital. My entire life’s worth of accomplishments can be measured in 0s and 1s. That’s what went through my mind today when[…]
Read more