Configure and Protect Devices with Microsoft Intune

Learn how and where to manage Windows, iOS, and Android device configurations, including certificate deployment, updates, and conditional access policies, in this course.
Course info
Rating
(12)
Level
Intermediate
Updated
Apr 28, 2020
Duration
2h 23m
Table of contents
Course Overview
Introduction
Create and Manage Configuration Profiles
Deploy Certificates to Devices
Update and Protect Devices
Configure Compliance Rules and Conditional Access Policies
Description
Course info
Rating
(12)
Level
Intermediate
Updated
Apr 28, 2020
Duration
2h 23m
Description

We have thus far in the learning path explored the architecture of Micosoft Intune and its role within Microsoft Endpoint Manager. We've also dug into the many different options for bootstrapping the enrollment of our devices. Now, it's time to actually manage them.

In this course, Configure and Protect Devices with Microsoft Intune, you'll begin to learn the broad array of configuration profile types that define which device settings you need to bring under management. First, you'll build a series of configuration profiles across each of your device types. Then, you'll learn the special configurations required to deploy certificates to devices. Next, you'll walk through the various update and protection features offered by Intune's configuration profiles. Finally, you'll learn how to combine compliance rules with conditional access policies to lock out those devices which don't meet your company standards. By the end of this course, you'll be able to manage the many different options for bootstrapping the enrollment of our devices with Microsoft Intune.

About the author
About the author

Greg Shields is an Author Evangelist at Pluralsight.

More from the author
Deploy Apps with Microsoft Intune
Intermediate
1h 35m
May 9, 2020
Enroll Devices into Microsoft Intune
Intermediate
2h 6m
Apr 28, 2020
More courses by Greg Shields
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, this is Greg Shields, and you found the next course in this learning path on implementing mobile device management with Microsoft into for Windows, IOS and Android devices. I am author of Angeles than a full time author here at Pluralsight, and I've been working with Device Management Solutions since the days devices were all just desktops. We have this fire. The Learning has explored the architecture of Microsoft in Tune and its role within Microsoft Endpoint editor. We've also dug into the many different options for bootstrapping the enrolment of our devices. Now it's time to actually manage them. In this course, you'll begin to learn the broad array of configuration profile types that define which device settings you need to bring under management. First, you'll build a series of configuration profiles across each of your device types. Then you'll learn the special configurations required to deploy certificates to devices. Next, you'll walk through the various update and protection features offered by in tunes configuration profiles. And finally, we'll explore how to combine compliance rules with conditional access policies. Toe lock out those devices which don't meet your company standards. If you've just been tasked with installing and configuring a Microsoft in tune deployment in your organization. This course is your next stop brushing up on those skills for success. And then from here you'll be ready to continue on the learning path as you deploy apse with Microsoft in tune, Let's get started.