Mohammed M.

Implementation Guide: Kandji for Comprehensive Apple Device Management

Introduction After implementing Kandji across dozens of organizations ranging from startups to Fortune 500 companies, I’ve learned that successful Kandji deployment goes far beyond simply enrolling devices and pushing profiles. The real value lies in understanding how to leverage Kandji’s modern approach to Apple device management to create streamlined, automated workflows that reduce administrative overhead […]

Implementation Guide: Kandji for Comprehensive Apple Device Management Read More »

Implementation Guide: Implementing Platform SSO on macOS Ventura with Entra ID

Introduction: Simplifying Mac Authentication in the Enterprise Platform SSO represents one of the most significant advances in macOS enterprise authentication since the introduction of Kerberos support. After implementing Platform SSO across multiple enterprise environments, I can confidently say it transforms the user experience while strengthening security posture. This implementation guide walks you through configuring Platform

Implementation Guide: Implementing Platform SSO on macOS Ventura with Entra ID Read More »

Troubleshooting: Solving Common Workspace ONE Tunnel Problems on Windows

Introduction: Solving the Most Frustrating Workspace ONE Tunnel Issues After supporting Workspace ONE Tunnel deployments across hundreds of organizations, I can tell you that tunnel connectivity issues are among the most frustrating problems IT administrators face. Users expect seamless access to corporate resources, but when Workspace ONE Tunnel fails, productivity grinds to a halt and

Troubleshooting: Solving Common Workspace ONE Tunnel Problems on Windows Read More »

Use Case: Planning a Migration from On-Prem Exchange to Microsoft 365

Introduction: The Strategic Move to Microsoft 365 After managing dozens of Exchange migrations over the past decade, I can confidently say that planning a migration from on-premises Exchange to Microsoft 365 is one of the most critical infrastructure projects an organization will undertake. The decision impacts every user in your organization and touches nearly every

Use Case: Planning a Migration from On-Prem Exchange to Microsoft 365 Read More »

Implementation Guide: Automating VM Deployments with Terraform and vSphere

Introduction: Infrastructure as Code Meets Virtualization In my years of working with enterprise virtualization environments, I’ve seen the evolution from manual VM provisioning to sophisticated automation platforms. Terraform has emerged as one of the most powerful tools for managing infrastructure as code, and its integration with vSphere opens up incredible possibilities for automating virtual machine

Implementation Guide: Automating VM Deployments with Terraform and vSphere Read More »

Troubleshooting: Common Pitfalls in a Horizon Cloud on Azure Deployment

Introduction: When Horizon Cloud on Azure Doesn’t Go as Planned Horizon Cloud on Azure represents VMware’s cloud-first approach to virtual desktop infrastructure, promising simplified deployment and management compared to traditional on-premises solutions. However, as I’ve learned through numerous customer deployments over the past few years, the reality often involves navigating a complex web of Azure

Troubleshooting: Common Pitfalls in a Horizon Cloud on Azure Deployment Read More »

Implementation Guide: Windows Modern Management Comprehensive Guide

Introduction: The Complete Guide to Windows Modern Management Windows modern management represents the evolution of enterprise device management from network-dependent, reactive approaches to cloud-first, proactive management. After implementing modern management across hundreds of organizations, I can confidently say that this transformation is not just about technology—it’s about fundamentally reimagining how we deliver and support the

Implementation Guide: Windows Modern Management Comprehensive Guide Read More »

Implementation Guide: Workspace ONE UAG – EUC’s Swiss Army Knife

Introduction: UAG as the Swiss Army Knife of EUC After implementing Unified Access Gateway (UAG) across dozens of enterprise environments, I’ve come to think of it as the Swiss Army Knife of End-User Computing. UAG serves as a secure gateway, load balancer, authentication broker, and application proxy all rolled into one powerful appliance. Whether you’re

Implementation Guide: Workspace ONE UAG – EUC’s Swiss Army Knife Read More »

Deep Dive: Workspace ONE Tunnel Custom Attributes

Introduction If you’ve worked with Workspace ONE Tunnel for any length of time, you’ve probably discovered that it’s much more than just a simple VPN client. While most administrators use it for basic per-app VPN functionality, Tunnel’s custom attributes feature opens up a world of advanced configuration possibilities that can solve complex enterprise networking challenges.

Deep Dive: Workspace ONE Tunnel Custom Attributes Read More »

Opinion: Mobile Device Management (MDM) Co-Existence

Introduction: The Reality of Multi-MDM Environments In my fifteen years of enterprise mobility consulting, I’ve encountered a persistent question that makes many IT leaders uncomfortable: “Can we run multiple MDM platforms simultaneously?” The textbook answer is always “no”—every vendor, consultant, and best practice guide will tell you to standardize on a single platform. But the

Opinion: Mobile Device Management (MDM) Co-Existence Read More »