Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune

Course Cover
compare button icon

Course Features

icon

Duration

174 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

174 minutes

Course Description

You could argue that there is an "old" and a "new way" to perform device configuration and endpoint security. The old method was based on registry keys and files. Sometimes, hacking both or both of these could be used to force a device into a particular configuration. The new approach is more MDM-like and leverages onboard Configuration Service Providers (CSPs) to manage, perform and report on change. The first step is to introduce Intune's basic framework for device configuration. This includes the configuration profile. It does a lot, but not all. Next, we'll explore custom configurations with ADMX-backed profile profiles. Next, you will learn how configuration profiles can be used to enable common Windows endpoint protection services. Then, you will see an example of how to deploy certificates to Intune-enrolled devices. You'll also see App Protection Policies, which are used to encrypt and protect data as it is created. This course will help you understand the many ways that Intune works with Microsoft Endpoint Manager.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

By the end of this course, you'll be one step further on your path to understanding the vast ways of using intune as part of microsoft endpoint manager

Finally, you'll see a special use case that is app protection policies for encrypting and protecting data as it gets created

You'll walk through an end-to-end example of deploying certificates to intune-enrolled devices

Course Cover