Microsoft Endpoint Manager: Compliance Policies with MECM and Intune
Offered By: Pluralsight
Course Description
Overview
Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant.
The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will. In this thirteenth course out of sixteen, Microsoft Endpoint Manager: Compliance Policies with MECM and Intune, you'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations. First, you'll start by looking at compliance in MECM. Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective. Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance. You'll create and deploy Intune compliance policies to see their effect on user's machines. Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant. By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune.
The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will. In this thirteenth course out of sixteen, Microsoft Endpoint Manager: Compliance Policies with MECM and Intune, you'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations. First, you'll start by looking at compliance in MECM. Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective. Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance. You'll create and deploy Intune compliance policies to see their effect on user's machines. Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant. By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune.
Syllabus
- Course Overview 1min
- Introduction 2mins
- Configure Compliance Rules with MECM 29mins
- Configure Compliance Policies and Conditional Access with Intune 18mins
Taught by
Greg Shields
Related Courses
Introduce Microsoft Endpoint Manager and Prepare Microsoft IntunePluralsight Microsoft Endpoint Manager: Package Software for Deployment with MECM and Intune
Pluralsight Microsoft Endpoint Manager: Intune Co-management with Cloud Attach
Pluralsight Microsoft Endpoint Manager: Inventory, Queries/Collections, and CMPivot with MECM
Pluralsight Microsoft Endpoint Manager: Deploy MECM Clients
Pluralsight