CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
Use Azure Managed Identity with Azure Automation PowerShell

Use Azure Managed Identity with Azure Automation PowerShell

by CPI Staff | Aug 8, 2025 | Azure, Azure PowerShell, Blog

When running scripts in Azure Automation, authentication is often the trickiest part. Your runbooks might need to connect to Azure services, Microsoft Graph, or other APIs — and that means handling credentials securely. In this guide, Use Azure Managed Identity with...
Run Azure PowerShell cmdlets using Docker Containers

Run Azure PowerShell cmdlets using Docker Containers

by CPI Staff | Jun 30, 2025 | Azure, Azure PowerShell, Blog, Docker

In this blog post, we’ll show you how to run Azure PowerShell cmdlets using Docker containers. Table of contentsPrerequisitesPull the Azure PowerShell Docker ImageRun the Container and Connect to AzureRunning Scripts from Your Local Machine Azure PowerShell provides a...

How to Restore an Azure VM OS Disk Using Azure PowerShell

by CPI Staff | Jun 27, 2025 | Azure, Azure PowerShell, Blog

In this Microsoft Azure PowerShell post, We’ll walk through how to restore the OS disk of an Azure VM using PowerShell. Restoring a virtual machine (VM) OS disk in Azure is a critical task when recovering from corruption, accidental deletion, or software...
List Classic Azure Administrators Using PowerShell and Azure REST API

List Classic Azure Administrators Using PowerShell and Azure REST API

by CPI Staff | Jul 11, 2024 | Azure, Azure PowerShell, Azure Security, Blog

This Microsoft Azure article will show how to list classic Azure Administrators using PowerShell and Azure REST API. As an IT consultancy company that helps companies safeguard their Azure tenant, we perform many tenant assessments. As part of our identity and access...

Recent Posts

  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune