![]() ![]() ![]() Today we will implement the DISA STIG into modern Intune profiles by using Security Baselines. All of that work has led up to this point, where we’ll be doing something completely new. When I first set out to do those tasks years ago I had to learn how to do them via trial and error, which is why I turned them into blog posts. In reality they were mostly mimicking work I’ve done before – leveraging LGPO and MMAT to apply GPOs. My last two posts have covered the DISA STIG in-depth. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |