Intune is the component of Enterprise Mobility + Security (EMS) that manages Windows 10/11 systems, mobile devices and apps. It integrates closely with other EMS components like Azure Active Directory (Azure AD) for identity and access control and Azure Information Protection for data protection.
Intune lets you manage your workforce’s devices and apps and how they access your company data. To use this mobile device management (MDM), the devices must first be enrolled in the Intune service. When a device is enrolled, it is issued an MDM certificate. This certificate is used to communicate with the Intune service.
Use device configuration profiles to manage and control a whole range of different features and functionality on devices.
Security matters. Every company is faced with several kinds of attacks and must implement different tools to protect themselves.
As an IT admin, you are responsible for making sure that your end users have access to the apps they need to do their work. This can be a challenge because there are a wide range of device platforms and app types. Moreover, you might need to manage apps on both company devices and user's own devices, while ensuring your network and your data remain secure.
Policies can be created to define whether devices are compliant, to configure conditional access or to protect app and device data.
The first thing you should protect are your identities. Especially in a cloud infrastructure, this should be your number one priority. Azure Active Directory provides a lot of security related features to control access to your environment.
Endpoint Protection provides real-time protection against malware threats, keeps malware definitions up-to date, and automatically scans computers. Endpoint Protection also provides tools that help you to manage and monitor malware attacks.
Devices can get compromised because of missing updates or vulnerabilities in applications. Microsoft Defender for Endpoint provides you with an inventory and gives you recommendations to make your environment more secure. This service also detects suspicious activities and alerts you about possible attacks.
So many different tools that collect so much information. You may be flooded with information. Microsoft 365 Defender brings it all together. It gives you better insights in attacks by showing you the devices, identities and apps that were involved. You can hunt for threats and be proactive, making sure the attacker doesn't stand a chance.
This course is intended for IT professional technical specialists responsible for managing devices in the cloud.