Description
Course info
Level
Intermediate
Updated
Oct 14, 2021
Duration
57m
Your 10-day individual free trial includes:

Expanded library

This course and over 7,000+ additional courses from our full course library.

Hands-on library

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.
*Available on Premium only
Description

Although MECM has lived a longer lifecycle than Intune, along with that long history comes a few legacy approaches to performing certain tasks. This course on device configuration may seem a little strange, because significant portions of the course are all about tasks that you ... shouldn't ... do in Configuration Manager. For many of today's device configuration and endpoint protection activities, Microsoft Intune simply offers a far superior solution. That said though, understanding where these configurations exist in MECM, and which ones you should enable versus those you can safely ignore is the mission for this course.

In this eleventh course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM, you'll start by exploring the options in MECM that exist for deploying device configurations to clients. Some of these, perhaps not surprisingly, involve technologies that have nothing to do with MECM at all, while others involve approaches that are better served through Intune's more MDM-like architecture. Next, you'll look at the endpoint protection policies in MECM, including which ones remain relevant for configuring via MECM today versus those better delivered from the Azure cloud.

About the author
About the author

Greg Shields is an Author Evangelist at Pluralsight.

More from the author
More courses by Greg Shields
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, this is Greg Shields, and you've found the 11th course in my learning path on the implementation and everyday use of Microsoft Endpoint Manager, including Configuration Manager, or MECM and Microsoft Intune. I am Principal Author Evangelist here at Pluralsight, and I've been working with MECM since way back in the days of SMS 1.2. Although MECM has lived a longer lifecycle than Intune, along with that long history comes a few legacy approaches for performing certain tasks. This course on device configuration may seem a little strange, because significant portions of the course are all about tasks that you shouldn't do in Configuration Manager. For many of today's device configuration and endpoint protection activities, Microsoft Intune simply offers a far superior solution. That said though, understanding where these configurations exist in MECM and which ones you should enable versus those you can safely ignore is the mission of this course. In this 11th course out of 16, you'll start by exploring the options in MECM that exist for deploying device configurations to clients. Some of these, perhaps not surprisingly, involve technologies that have nothing to do with MECM at all, while others involve approaches that are better served through Intune's more MDM‑like architecture. Next, you'll look at the endpoint protection policies in MECM, including which ones remain relevant for configuring via MECM today versus those better served from the Azure cloud. If you've just been tasked with implementing and/or managing a Microsoft endpoint manager environment, this course is your next stop in brushing up on those skills for success. And, then from here, you'll be ready to continue on the learning path as we explore all the major areas of endpoint configuration that you get with a fully realized Microsoft endpoint manager solution. Let's get started.