Introduction to endpoint management
The course starts by looking at the need in the modern information world for the need of a unified endpoint management solution.
Microsoft Endpoint Manager options and choosing a licensing solution
We’ll then see where Endpoint Manager fits in to the Microsoft ecosphere and examine the different licensing options available.
Role Based Access Control
Once Endpoint Manger is enabled we’ll look at how to build a robust support structure enabling fine grained control using Role Based Access Control (RBAC).
Hybrid environments
Next we’ll look at using Endpoint Manager in a hybrid environment, exploring how Azure Active Directory and Active Directory Domain Services can be linked, how the co-management capabilities of Configuration Manager can concurrently manage Windows 10 and Windows 11.
Device enrolment and management
After fully configuring Endpoint, we’ll then look at how device management works. We start by enrolling devices in to Endpoint using automated options such as AutoPilot V2, Apple Business Manager and Google zero-touch. Ensuring devices meet corporate requirements with device compliance policies and finally we’ll implement conditional access to ensure devices can only access services when they meet all corporate requirements.
Application deployment and control
Once we have devices enrolled and managed, we then take a look at deploying, configuring and protecting apps. We start by looking at how we can obtain apps from Microsoft’s business store, Apple’s App Store and Google Play store. We’ll link Endpoint Manager to each store so that apps can be acquired at a corporate level and distributed to devices.
Once apps are installed we then look at how corporate data can be protected and managed using App Protection Policies. Finally we look at App configuration policies, allowing apps to be configured before they are first used.
Security in Microsoft Intune, covering key features and their practical applications
Participants will learn about the difference between Endpoint Security, which configures device security policies, and Microsoft Defender for Endpoint, which focuses on advanced threat detection and response.
The module explains BitLocker drive encryption for Windows devices and FileVault on macOS devices, the use of Windows security baselines for deploying best practices, and how Intune integrates with Windows Defender Antivirus for protection.
It also covers the Activation Lock feature for securing Apple devices and the different device management actions in Intune, such as Wipe, Retire, and Delete.
By the end, participants will understand how to leverage Intune's security features to protect organisational data and devices.
Monitoring and reporting
Finally we take a look at the reporting tools built in to Endpoint manager to allow for dynamic monitoring of the health and activity of endpoint devices.