MESSAGE US
  • Home
  • Our Services
    • Endpoint Management
      • IT Maturity Health Check
      • Model PowerBI Dashboard
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
    • Tier 1 Help Desk Services
    • Microsoft 365 As A Service
  • About Us
    • How We Work
  • Resources
  • Blog
  • Contact Us
    • Work For Us
Protect Business Data On Personal Devices With M65 Endpoint Security

Protect Business Data On Personal Devices With M65 Endpoint Security

by Mike Brimberry | Dec 8, 2022 | Cyber Security, Microsoft Intune

Estimated Reading Time: 5 minutesBring your own device (BYOD) refers to a policy of permitting employees to use personally-owned devices (laptops, tablets, and smartphones) to access company information and applications. BYOD continues to grow in popularity among...
Advanced Reporting with Microsoft Graph API and Power BI | Microsoft Intune Reporting Series, Part Four

Advanced Reporting with Microsoft Graph API and Power BI | Microsoft Intune Reporting Series, Part Four

by Gabriel Taylor | Jul 12, 2022 | Endpoint Management, Microsoft Intune, Patch Management

Estimated Reading Time: 12 minutesWelcome to the fourth post in our Microsoft Intune Reporting series. In our first post, we introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn...
Advanced Reporting with Intune Data Warehouse and Log Analytics | Microsoft Intune Reporting Series, Part Three

Advanced Reporting with Intune Data Warehouse and Log Analytics | Microsoft Intune Reporting Series, Part Three

by Gabriel Taylor | Apr 11, 2022 | Microsoft Intune

Estimated Reading Time: 10 minutesWelcome to the third post of our Intune Reporting Series. The first post introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn throughout the system. The...
Efficient and Intuitive | Application Management (Level 5)

Efficient and Intuitive | Application Management (Level 5)

by Jason Rutherford | Mar 30, 2022 | Endpoint Management, Unified Endpoint Management

Estimated Reading Time: 5 minutesWelcome to Model’s approach to Unified Endpoint Management Application Management Level 5. This is part of the Maturity Model series on Unified Endpoint Management. Today’s post will cover: A definition of Unified Endpoint...
Organizational and Historical Reports | Microsoft Intune Reporting Series, Part Two

Organizational and Historical Reports | Microsoft Intune Reporting Series, Part Two

by Gabriel Taylor | Mar 1, 2022 | Microsoft Intune

Estimated Reading Time: 12 minutesWelcome to the second post in our Intune Reporting series! Part one of this series introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn throughout the...
« Older Entries

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2023 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow