Expanded

Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune

Go deep into device configuration and endpoint protection in this course. Build configuration profiles and ADMX-backed policies, deploy endpoint security settings, app protection policies, and device certificates, all using Microsoft Intune.
Course info
Level
Intermediate
Updated
Oct 21, 2021
Duration
2h 54m
Table of contents
Course Overview
Introduction
Configure Configuration Profiles with Intune
Configure ADMX-backed Policies with Intune
Configure Endpoint Security with Intune
Deploy Device Certificates with Intune
Configure App Protection Policies with Intune
Description
Course info
Level
Intermediate
Updated
Oct 21, 2021
Duration
2h 54m
Your 10-day individual free trial includes:

Expanded library

This course and over 7,000+ additional courses from our full course library.

Hands-on library

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.
*Available on Premium only
Description

One might argue that there's an "old" way and a "new" way to performing device configuration and endpoint protection. The old way focused on files and registry keys, sometimes hacking either or both to force a machine into a certain configuration. The new way is more MDM-like in nature, leveraging onboard Configuration Service Providers to manage, perform, and report back on the change.

In this twelfth course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune, you'll explore deeply how Intune enacts change via the latter of these approaches. First, you'll start with an introduction to the basic foundation of device configuration in Intune -- the configuration profile, which accomplishes a lot but not everything. Next, you'll dig deeply into custom configurations using ADMX-backed profiles. Then, you'll explore how configuration profiles can enable many of the common endpoint protection services in Windows. Afterwards, you'll walk through an end-to-end example of deploying certificates to Intune-enrolled devices. Finally, you'll see a special use case that is App Protection Policies for encrypting and protecting data as it gets created. By the end of this course, you'll be one step further on your path to understanding the vast ways of using Intune as part of Microsoft Endpoint Manager.

About the author
About the author

Greg Shields is an Author Evangelist at Pluralsight.

More from the author
More courses by Greg Shields
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey. This is Greg Shields, and you've found the 12th course of my learning path on the implementation and everyday use of Microsoft Endpoint Manager, including Configuration Manager, or MECM, and Microsoft Intune. I am principal author evangelist here, at Pluralsight, and I've been working with MECM since way back in the days of SMS 1.2. One might argue that there is an old way and a new way to performing device configuration and endpoint protection. The old way focused on files and registry keys, sometimes hacking either or both to force a machine into a certain configuration. The new way is more MDM‑like in nature, leveraging on‑board configuration service providers to manage, perform, and then report back on the change. In this course, we explore deeply how Intune and Exchange be the latter of these approaches. In this 12th course out of 16, you'll start with an introduction of the basic foundation of device configuration in Intune, the configuration profile. These config profiles could accomplish a lot, but not everything. So next, you'll dig deeply into custom configurations using ADMX‑backed profiles. Then, you'll explore how configuration profiles can enable many of the common endpoint protection services in Windows. Afterwards, you'll walk through an end‑to‑end example deploying certificates to Intune‑enrolled devices. Finally, you'll see a special use case in app protection policies for encrypting and protecting data as it gets created. If you've just been tasked with implementing and/or managing a Microsoft Endpoint Manager environment, this course is your next stop in brushing up on those skills for success. And then from here, you'll be ready to continue on the learning path as we explore all the major areas of endpoint configuration that you get with a fully realized Microsoft Endpoint Manager solution. Let's get started.