Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM
Offered By: Pluralsight
Course Description
Overview
Understand the device configuration and endpoint protection features that you should -- and shouldn't -- implement via MECM in this course.
Although MECM has lived a longer lifecycle than Intune, along with that long history comes a few legacy approaches to performing certain tasks. This course on device configuration may seem a little strange, because significant portions of the course are all about tasks that you ... shouldn't ... do in Configuration Manager. For many of today's device configuration and endpoint protection activities, Microsoft Intune simply offers a far superior solution. That said though, understanding where these configurations exist in MECM, and which ones you should enable versus those you can safely ignore is the mission for this course. In this eleventh course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM, you'll start by exploring the options in MECM that exist for deploying device configurations to clients. Some of these, perhaps not surprisingly, involve technologies that have nothing to do with MECM at all, while others involve approaches that are better served through Intune's more MDM-like architecture. Next, you'll look at the endpoint protection policies in MECM, including which ones remain relevant for configuring via MECM today versus those better delivered from the Azure cloud.
Although MECM has lived a longer lifecycle than Intune, along with that long history comes a few legacy approaches to performing certain tasks. This course on device configuration may seem a little strange, because significant portions of the course are all about tasks that you ... shouldn't ... do in Configuration Manager. For many of today's device configuration and endpoint protection activities, Microsoft Intune simply offers a far superior solution. That said though, understanding where these configurations exist in MECM, and which ones you should enable versus those you can safely ignore is the mission for this course. In this eleventh course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM, you'll start by exploring the options in MECM that exist for deploying device configurations to clients. Some of these, perhaps not surprisingly, involve technologies that have nothing to do with MECM at all, while others involve approaches that are better served through Intune's more MDM-like architecture. Next, you'll look at the endpoint protection policies in MECM, including which ones remain relevant for configuring via MECM today versus those better delivered from the Azure cloud.
Syllabus
- Course Overview 2mins
- Introduction 1min
- Configure Devices with MECM 27mins
- Configure Endpoint Protection Policies with MECM 26mins
Taught by
Greg Shields
Related Courses
Administrasi Sistem dan Layanan Infrastruktur TIGoogle via Coursera Operate Alibaba Cloud Systems and Services
Alibaba via Coursera Amazon Elastic File System (Amazon EFS) Primer (German)
Amazon Web Services via AWS Skill Builder Amazon Elastic File System (Amazon EFS) Primer (Indonesian)
Amazon Web Services via AWS Skill Builder Amazon Elastic File System (Amazon EFS) Primer (Japanese)
Amazon Web Services via AWS Skill Builder