Companies Home Search Profile

Microsoft Endpoint Manager: Compliance Policies with MECM and Intune

Focused View

Greg Shields

52:25

10 View
  • 1. Course Overview.mp4
    01:58
  • 1. Introduction.mp4
    02:20
  • 1. Introduction.mp4
    02:05
  • 2. Understand Compliance with MECM.mp4
    08:11
  • 3. Create Configuration Items with Device Settings.mp4
    02:22
  • 4. Construct Configuration Items with Remediation.mp4
    06:09
  • 5. Construct Configuration Items for Application Installation.mp4
    02:14
  • 6. Create and Deploy Configuration Baselines.mp4
    01:50
  • 7. Validate Compliance and Remediate.mp4
    03:53
  • 8. Explore Compliance Reports.mp4
    01:50
  • 9. Create Collections from Compliance Information.mp4
    01:12
  • 1. Introduction.mp4
    01:46
  • 2. Configure Compliance Co-management Workload for Intune.mp4
    01:07
  • 3. Create Compliance Policies.mp4
    03:52
  • 4. Create Compliance Policies with MECM Rules.mp4
    01:29
  • 5. Monitor Device Compliance.mp4
    02:56
  • 6. Configure Conditional Access Policies.mp4
    05:58
  • 7. Validate Conditional Access Policy Enforcement.mp4
    01:13
  • Description


    Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant.

    What You'll Learn?


      The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will.
      In this thirteenth course out of sixteen, Microsoft Endpoint Manager: Compliance Policies with MECM and Intune, you'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations. First, you'll start by looking at compliance in MECM. Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective. Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance. You'll create and deploy Intune compliance policies to see their effect on user's machines. Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant. By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Greg Shields
    Greg Shields
    Instructor's Courses
    Greg Shields is Sr. Director of IT Ops Skills at Pluralsight and formerly Principal Author Evangelist. Reach him on Twitter @ConcentratdGreg.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 18
    • duration 52:25
    • level average
    • English subtitles has
    • Release Date 2023/12/15

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering