Configure and Protect Devices with Microsoft Intune
Offered By: Pluralsight
Course Description
Overview
Learn how and where to manage Windows, iOS, and Android device configurations, including certificate deployment, updates, and conditional access policies, in this course.
We have thus far in the learning path explored the architecture of Micosoft Intune and its role within Microsoft Endpoint Manager. We've also dug into the many different options for bootstrapping the enrollment of our devices. Now, it's time to actually manage them. In this course, Configure and Protect Devices with Microsoft Intune, you'll begin to learn the broad array of configuration profile types that define which device settings you need to bring under management. First, you'll build a series of configuration profiles across each of your device types. Then, you'll learn the special configurations required to deploy certificates to devices. Next, you'll walk through the various update and protection features offered by Intune's configuration profiles. Finally, you'll learn how to combine compliance rules with conditional access policies to lock out those devices which don't meet your company standards. By the end of this course, you'll be able to manage the many different options for bootstrapping the enrollment of our devices with Microsoft Intune.
We have thus far in the learning path explored the architecture of Micosoft Intune and its role within Microsoft Endpoint Manager. We've also dug into the many different options for bootstrapping the enrollment of our devices. Now, it's time to actually manage them. In this course, Configure and Protect Devices with Microsoft Intune, you'll begin to learn the broad array of configuration profile types that define which device settings you need to bring under management. First, you'll build a series of configuration profiles across each of your device types. Then, you'll learn the special configurations required to deploy certificates to devices. Next, you'll walk through the various update and protection features offered by Intune's configuration profiles. Finally, you'll learn how to combine compliance rules with conditional access policies to lock out those devices which don't meet your company standards. By the end of this course, you'll be able to manage the many different options for bootstrapping the enrollment of our devices with Microsoft Intune.
Syllabus
- Course Overview 1min
- Introduction 2mins
- Create and Manage Configuration Profiles 52mins
- Deploy Certificates to Devices 39mins
- Update and Protect Devices 15mins
- Configure Compliance Rules and Conditional Access Policies 30mins
Taught by
Greg Shields
Related Courses
AWS IoT: Developing and Deploying an Internet of ThingsAmazon Web Services via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via Coursera AWS Snowball Edge: Using Snowball Edge (Simplified Chinese)
Amazon Web Services via AWS Skill Builder AWS Snowball Edge: Using Snowball Edge (Traditional Chinese)
Amazon Web Services via AWS Skill Builder Cloud Audit Academy – クラウドにとらわれない (Japanese)
Amazon Web Services via AWS Skill Builder