Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Microsoft Endpoint Manager: Compliance Policies with MECM and Intune

Course Cover
compare button icon

Course Features

icon

Duration

52 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

52 minutes

Course Description

Over the past couple of courses, the discussion about device configuration has been focused only on the configurations. These configurations can be thought of more as preferences than a policy. Although they configure the machines, users have the ability to modify those configurations at will. This thirteenth course in the series, Microsoft Endpoint Manager Compliance Policies with MECM & Intune, teaches you how to enforce configurations, declare non-compliant machines, and bring about consequences for those misconfigurations. You'll first look at compliance in MECM. Next, you will configure custom MECM compliance policies including auto-remediation. Finally, you'll see how they look from a user's perspective. Next, you will switch to Intune and explore the completely different approach Intune takes to compliance. To see the impact of Intune compliance policies on users' machines, you will create and deploy Intune compliance policy. You'll also connect compliance policies with conditional access policies, and deprive machines of access to corporate resources if they are not in compliance. This course will give you a better understanding about how to enforce configurations in MECM and Intune.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

You'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations

First, you'll start by looking at compliance in MECM

Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective

Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance

You'll create and deploy Intune compliance policies to see their effect on user's machines

Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant

By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune

Course Instructors

Author Image

Greg Shields

Instructor

Greg Shields is Sr. Director of IT Ops Skills at Pluralsight and formerly Principal Author Evangelist. Reach him on Twitter @ConcentratdGreg.
Course Cover