<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>ralpheckhard.com</title><link>https://www.ralpheckhard.com/</link><description>ralpheckhard.com | Cloud Consultant &amp; MCT</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.</copyright><lastBuildDate>Sat, 28 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.ralpheckhard.com/index.xml" rel="self" type="application/rss+xml"/><item><title>Using Windows 365 Cloud PC's for your PAW Needs</title><link>https://www.ralpheckhard.com/2026-03-28-using-cloudpc-for-your-paw-needs/</link><pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2026-03-28-using-cloudpc-for-your-paw-needs/</guid><description><![CDATA[<p>Windows 365 is your workplace from the cloud - a Windows machine running in a Microsoft datacenter, that you can acccess from everywhere, anytime. And as it&rsquo;s Intune-managed, you can configure it anyway you like.</p>
<p>That brings some cool possibilities. What if you need a PAW - a Priviliged Access Workstation - that you can use to do all your administrative tasks in a secure way?</p>
<h2 id="paw-principles">PAW Principles</h2>
<p>A Privileged Access Workstation is built around several core security principles that protect administrative credentials and operations:</p>]]></description></item><item><title>Understanding Windows 365 Connectivity: From TCP Gateways to STUN, TURN, and RDP Shortpath</title><link>https://www.ralpheckhard.com/2026-03-14-understanding-windows-365-connectivity-stun-turn-tcp-copy/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2026-03-14-understanding-windows-365-connectivity-stun-turn-tcp-copy/</guid><description><![CDATA[<h1 id="optimizing-your-windows-365-experience-a-deep-dive-into-connectivity-options">Optimizing your Windows 365 experience: A deep dive into connectivity options</h1>
<p>Running a Cloud PC is one thing. Making sure the connection you have to it, is another. In this post, we will explore how Windows 365 establishes connectivity, the different transport options it uses, and how to optimize for the best possible experience.</p>
<h2 id="windows-365-connectivity-the-basics">Windows 365 Connectivity: The Basics</h2>
<p>When you connect to a Windows 365 Cloud PC, your device needs to establish a connection to the virtual machine running in Microsoft&rsquo;s datacenters. This connection is critical for performance, responsiveness, and overall user experience. Various factors can influence the quality of this connection, including network configuration, firewall rules, and the presence of NAT (Network Address Translation). Let&rsquo;s have a look at the different connection types and how Windows 365 handles them.</p>]]></description></item><item><title>Stream apps from Windows 365</title><link>https://www.ralpheckhard.com/2026-01-19-stream-apps-from-windows-365/</link><pubDate>Sun, 18 Jan 2026 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2026-01-19-stream-apps-from-windows-365/</guid><description><![CDATA[<p>One of the latest additions to Windows 365 is a long awaited one: the ability to &lsquo;stream&rsquo; applications, as opposed to an entire desktop, to end users. <a href="https://learn.microsoft.com/en-gb/windows-365/enterprise/cloud-apps?WT.mc_id=MVP_396303" target="_blank" rel="noopener noreffer">Windows 365 Cloud Apps</a> wil give you the ability to deliver indiviudal apps, without the hassle of maintinging images or application installs, all because of the power of Intune.</p>
<p>In this blogpost, I will walk you to the setup proces of Windows 365 Cloud Apps, so you can start streaming your apps within no time.</p>]]></description></item><item><title>The Facilitator Agent in Microsoft Teams: Turning Meetings into Structured Work</title><link>https://www.ralpheckhard.com/2025-12-18-facilitator-agent-in-microsoft-teams/</link><pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2025-12-18-facilitator-agent-in-microsoft-teams/</guid><description>&lt;p>Meetings are still where most decisions get made.
They’re also where context gets lost, actions fade away, and follow-ups become someone else’s problem.
Hybrid work didn’t create bad meetings — it just made their weaknesses more visible. People join late, leave early, miss sessions entirely, or juggle three meetings at once. The result is familiar: “What did I miss?”, “Was that actually decided?”, and “Who was going to follow up on that?”
Microsoft’s Facilitator agent in Teams is designed to address exactly that problem. Not by adding more process, but by adding structure at the right moments — before, during, and after the meeting.&lt;/p></description></item><item><title>Biometrics in Teams: Why you should let Teams hear your voice</title><link>https://www.ralpheckhard.com/2025-09-08-teams-voice-enrollment/</link><pubDate>Mon, 08 Sep 2025 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2025-09-08-teams-voice-enrollment/</guid><description><![CDATA[<p>In Teams, you have the option to do a &lsquo;Voice and Face Enrollment&rsquo;. But what is this feature? What&rsquo;s in it for you? And what are the administrative implications? Let&rsquo;s dive in!</p>
<h2 id="what-is-voice-and-face-enrollment-in-teams">What is Voice and Face Enrollment in Teams?</h2>
<p>With this feature in Teams, you can enroll your voice and face. Sounds cool, right? It basically &rsquo;learns&rsquo; Teams how you sound and what you look like, so Teams can use it in your advantage. For example, it can help with background noise suppression, or even help you find your way in a meeting by recognizing your voice and face.</p>]]></description></item><item><title>Custom Compliance policy for local admins</title><link>https://www.ralpheckhard.com/2025-07-26-custom-compliance-for-local-admins/</link><pubDate>Sat, 26 Jul 2025 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2025-07-26-custom-compliance-for-local-admins/</guid><description><![CDATA[<p>My current gig is about replacing the current workplace, based on Windows 10, on-prem Active Directory and SCCM, with a &lsquo;Cloud Managed Workplace&rsquo;: Windows 11, Entra ID Joined devices, Intune Management and autopilot deployment.</p>
<p>One of the main security risks in the current workplace is the vast amount of users with local administrator rights on their devices. Time to change that!</p>
<h2 id="revoking-local-admin-rights">Revoking local admin rights</h2>
<p>Revoking local admin rights isn&rsquo;t that hard, technically. You just take away the rights, or don&rsquo;t give new local admin rights when replacing devices. The greatest challenges comes with user behaviour and politics. Those local admin rights are there for a reason, and people seem to really get attached to having those rights. So, communication is key.</p>]]></description></item><item><title>Add holidays to Teams Phone in an automated way</title><link>https://www.ralpheckhard.com/2024-07-16-add-holidays-to-teams-phone-in-an-automated-way/</link><pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2024-07-16-add-holidays-to-teams-phone-in-an-automated-way/</guid><description><![CDATA[<h2 id="adding-holidays-to-teams-in-an-automated-way">Adding holidays to Teams in an automated way</h2>
<p>A quick blogpost today, leveraging some PowerShell goodness.</p>
<p>In a recent project, I was setting up Teams Phone System. One of the regular maintenance tasks in day to day operation, is making sure the opening hours set in the callflows (with your Auto Attendants) match the actual working hours of your business. One of the features here is the use of &lsquo;holidays&rsquo;, to specify days on which the Auto Attendant will not follow the regular opening hours, but will use a seperately defined schedule in stead.</p>]]></description></item><item><title>BIO Compliancy in M365</title><link>https://www.ralpheckhard.com/2024-07-20-bio-compliancy-m365/</link><pubDate>Thu, 04 Jul 2024 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2024-07-20-bio-compliancy-m365/</guid><description><![CDATA[<p>Recently, Microsoft published some tooling to check the BIO Compliancy of your M365 tenant.
As BIO is a Dutch thing, this blogpost will be in Dutch :)</p>
<h2 id="bio-voor-de-overheid">BIO voor de overheid</h2>
<p>De <a href="https://www.digitaleoverheid.nl/overzicht-van-alle-onderwerpen/cybersecurity/bio-en-ensia/baseline-informatiebeveiliging-overheid/" target="_blank" rel="noopener noreffer">Baseline Informatiebeveiiging Overheid</a> (kortweg BIO) is het &lsquo;basisnormenkader&rsquo; voor informatiebeveiliging binnen alle overheidslagen. Voorheen had elke overheidslaag (Rijksoverheid, uitvoeringsinstanties, gemeentes, etc.) zijn of haar eigen baseline, inmiddels is er dus één BIO voor alle overheden. Deze BIO is in December 2018 vastgesteld door de ministerraad. Vanaf 1 janauri 2019 is er daadwerkelijk gestart met de implementatie. Hoewel er dus één baseline is, zorgen alle overheidslagen zelf voor de eigen implementatie.</p>]]></description></item><item><title>Secure your admin account with conditional access</title><link>https://www.ralpheckhard.com/2024-02-25-secure-your-admin-account-with-ca/</link><pubDate>Sun, 25 Feb 2024 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2024-02-25-secure-your-admin-account-with-ca/</guid><description><![CDATA[<p>Authentication Strengths in Condtional Access are a fun thing. You can use them to provide some extra security where it&rsquo;s needed. In this blogpost, we&rsquo;ll look at using authentication strengths in Condtional Access to make sign-ins with your admin accounts extra secure.</p>
<h2 id="what-are-authentication-strengths">What are authentication strengths</h2>
<p><a href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-strengths?WT.mc_id=MVP_396303" target="_blank" rel="noopener noreffer">Authentication strengths</a> are esactly what you would expect by the name: they define how strong your authentication is. This has mainly to do with extra forms of authentication besides the password, so Multi-Factor Authentication, and if this MFA can be &lsquo;stolen&rsquo; somewhere in the authentication process.</p>]]></description></item><item><title>Conditional Access Demistified</title><link>https://www.ralpheckhard.com/2024-01-31-conditional-access-demistified/</link><pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate><author>Author</author><guid>https://www.ralpheckhard.com/2024-01-31-conditional-access-demistified/</guid><description><![CDATA[<p>Conditional Access is one of the most important security features in Entra ID. It ties all the security components of your modern workplace together and you can build all the rules you need to match your security requirements. But with great strength, comes&hellip;. Well, confusion. In the trainings I deliver is a MCT, I see a lot of students that are confused with all the posibilities within Conditonal Access. In this blogpost, I&rsquo;ll try to help you understand all the posibilities so you can get started building your own policies.</p>]]></description></item></channel></rss>