Posts

Showing posts from March, 2026

Vulnerabilities Dashboard

Image
  Have you previously operated a device to mitigate vulnerabilities and subsequently received an extensive list of vulnerabilities from cybersecurity for that device? You are not alone in this experience.   This isn't a new feature, we are fortunate to have talented individuals in the community, such as Fabian Bader and Nathen McNulty, who have made significant contributions in this area. I have documented their efforts and recommended their work to my clients during my collaborations.   During my previous engagement with the Intune team, I observed that their permissions were highly restricted. They lacked access to cybersecurity tools such as Defender, Tenable, CrowdStrike, and Entra. As a result, they were unable to independently identify device deficiencies or vulnerabilities, relying instead on their cybersecurity team for such information. When I recommended community solutions, they expressed appreciation. However, they do not possess the authority to develop appli...