We may earn an affiliate commission when you visit our partners.
Greg Shields

Go deep into device configuration and endpoint protection in this course. Build configuration profiles and ADMX-backed policies, deploy endpoint security settings, app protection policies, and device certificates, all using Microsoft Intune.

Read more

Go deep into device configuration and endpoint protection in this course. Build configuration profiles and ADMX-backed policies, deploy endpoint security settings, app protection policies, and device certificates, all using Microsoft Intune.

One might argue that there's an "old" way and a "new" way to performing device configuration and endpoint protection. The old way focused on files and registry keys, sometimes hacking either or both to force a machine into a certain configuration. The new way is more MDM-like in nature, leveraging onboard Configuration Service Providers to manage, perform, and report back on the change.

In this twelfth course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune, you'll explore deeply how Intune enacts change via the latter of these approaches. First, you'll start with an introduction to the basic foundation of device configuration in Intune -- the configuration profile, which accomplishes a lot but not everything. Next, you'll dig deeply into custom configurations using ADMX-backed profiles. Then, you'll explore how configuration profiles can enable many of the common endpoint protection services in Windows. Afterwards, you'll walk through an end-to-end example of deploying certificates to Intune-enrolled devices. Finally, you'll see a special use case that is App Protection Policies for encrypting and protecting data as it gets created. By the end of this course, you'll be one step further on your path to understanding the vast ways of using Intune as part of Microsoft Endpoint Manager.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Introduction
Configure Configuration Profiles with Intune
Configure ADMX-backed Policies with Intune
Read more
Configure Endpoint Security with Intune
Deploy Device Certificates with Intune
Configure App Protection Policies with Intune

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Focuses on cybersecurity management of endpoint devices and data in Microsoft's cloud
Taught by subject matter expert Greg Shields
Takes an in-depth and practical approach to device configuration and endpoint protection via Microsoft Intune
Covers both basic and advanced concepts, making it suitable for various learner levels
Emphasizes real-world examples and hands-on exercises to enhance comprehension
May require additional resources and knowledge of Windows systems for optimal learning

Save this course

Save Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune with these activities:
Review Intune fundamentals
Students will have a stronger foundation after reviewing key concepts of Intune, Device Management, and Microsoft Endpoint Manager.
Browse courses on Intune
Show steps
  • Read through Intune documentation
  • Complete Microsoft Learn modules
  • Watch Intune-related videos
Seek Guidance from Intune Experts
Connecting with Intune experts will provide students with invaluable insights, advice, and support throughout their learning journey.
Show steps
  • Find potential mentors through online forums
  • Reach out to experienced Intune professionals
  • Build a mutually beneficial mentoring relationship
Read 'Intune for Dummies' by Greg Shields
Gain foundational knowledge of Intune by reading this book.
Show steps
  • Purchase or borrow the book
  • Read the book and take notes on key concepts
  • Complete the practice exercises in the book
11 other activities
Expand to see all activities and additional details
Show all 14 activities
Follow Microsoft's tutorials on deploying certificates with Intune
Follow Microsoft's tutorials to gain practical experience deploying certificates with Intune.
Show steps
  • Access Microsoft's documentation on deploying certificates with Intune
  • Follow the step-by-step instructions provided in the tutorials
  • Test your certificate deployment and troubleshoot any issues
Practice configuring profiles using Intune
Practice configuring profiles to gain a deeper understanding of the process and improve your skills.
Browse courses on Configuration Profiles
Show steps
  • Create a new configuration profile in Intune
  • Configure the settings for the profile
  • Assign the profile to a group of devices
  • Monitor the status of the profile deployment
Participate in a study group focused on Intune device management
Collaborate with peers to enhance your understanding of Intune device management.
Browse courses on Device Configuration
Show steps
  • Find a study group or create your own
  • Establish regular meeting times and a communication channel
  • Discuss Intune concepts, share experiences, and work on projects together
Practice Intune Configuration Profiles
This tutorial will help students apply their knowledge on Intune configuration profiles, enhancing their understanding.
Browse courses on Configuration Profiles
Show steps
  • Follow a guided tutorial on creating Configuration Profiles
  • Build and deploy a simple Configuration Profile
  • Troubleshoot common issues
Develop a prototype Intune deployment plan for a small organization
Create a plan to prepare you for implementing Intune in a real-world scenario.
Browse courses on Project Development
Show steps
  • Gather requirements from stakeholders
  • Design the Intune deployment architecture
  • Develop a migration plan
  • Test and pilot the deployment
Attend Intune Community Workshops
In-person or virtual workshops led by experienced professionals can provide valuable knowledge and networking opportunities.
Browse courses on Device Management
Show steps
  • Identify relevant Intune community workshops
  • Register and participate in the workshops
  • Engage with speakers and connect with peers
Contribute to the Intune community by reporting issues or suggesting improvements
Engage with the Intune community and make valuable contributions.
Browse courses on Collaboration
Show steps
  • Join the Intune community forums
  • Review existing issues and contributions
  • Report new issues or suggest improvements
  • Collaborate with other Intune users and developers
Create a blog post about endpoint security with Intune
Create a blog post to share your knowledge and understanding of endpoint security with Intune.
Browse courses on Endpoint Security
Show steps
  • Research endpoint security best practices and Intune features
  • Write a draft of your blog post
  • Edit and revise your post for clarity and accuracy
  • Publish your blog post and promote it on social media
Secure Devices with Intune Policies
Students will gain hands-on experience in securing devices by creating and deploying Intune Endpoint Protection policies.
Browse courses on Endpoint Protection
Show steps
  • Design and create Intune Endpoint Protection Policies
  • Deploy and test the policies
  • Write documentation on the process
Develop a security policy for app protection in your organization
Develop a security policy to ensure the protection of data in your organization.
Browse courses on App Protection Policies
Show steps
  • Identify the types of data that need to be protected
  • Determine the appropriate level of protection for each type of data
  • Develop policies and procedures for app protection
  • Implement and enforce the security policy
Participate in Intune Challenges
Participating in Intune challenges will push students to explore the platform in depth, enhance their skills, and benchmark their progress.
Show steps
  • Register for Intune hackathons or competitions
  • Work on solving complex Intune scenarios
  • Submit solutions and compete with others

Career center

Learners who complete Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers plan and implement security measures to protect an organization's computer systems and networks. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune helps Security Engineers in fulfillment of these duties by building a deep foundation in Intune's capabilities for device configuration and protecting endpoints.
Security Analyst
Security Analysts monitor and analyze an organization's security systems to identify and respond to security threats. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune provides Security Analysts with deep knowledge of the Intune features used to protect the confidentiality, integrity, and availability of an organization's data and information.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation and maintenance of an organization's computer systems and networks. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune directly teaches Systems Administrators how to use Intune to configure devices, protect systems, and deploy certificates.
Network Administrator
Network Administrators are responsible for the design, implementation, and maintenance of an organization's computer networks. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune helps Network Administrators with network security by offering training on deploying endpoint security, configuring profiles, and more.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information assets. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune helps these professionals in these responsibilities by teaching them how to use Intune to perform configuration profiles, deploy certificates, configure app protection policies, and more.
IT Consultant
IT Consultants provide expert advice and guidance to organizations on how to use information technology to meet their business needs. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune equips IT Consultants with the knowledge to advise clients on how to enhance their device security using Microsoft's solutions.
IT Manager
IT Managers plan, implement, and manage an organization's information technology systems and resources. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune aids IT Managers in these activities by providing a solid understanding of how to leverage Intune for critical device configuration and endpoint protection.
IT Auditor
IT Auditors evaluate an organization's information technology systems and practices to ensure compliance with laws, regulations, and internal policies. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune strengthens the ability of IT Auditors to assess an organization's device security posture by providing insights into Intune's configuration and protection capabilities.
IT Support Specialist
IT Support Specialists provide technical support to users of an organization's computer systems and networks. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on device configuration and endpoint protection, which are key aspects of providing IT support.
Cybersecurity Analyst
Cybersecurity Analysts plan and implement security measures to protect an organization's computer systems and networks from cyberattacks. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on endpoint security configuration, device certificate deployment, and app protection policies.
IT Security Specialist
IT Security Specialists plan and implement security measures to protect an organization's information technology systems and resources. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on device configuration and endpoint protection, which are key aspects of IT security.
Cloud Security Engineer
Cloud Security Engineers design and implement security measures to protect an organization's cloud-based systems and applications. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on endpoint protection and device configuration, which are key aspects of cloud security.
Penetration Tester
Penetration Testers assess the security of an organization's computer systems and networks by simulating cyberattacks. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on endpoint protection and device configuration, which are key aspects of penetration testing.
Incident Responder
Incident Responders investigate and respond to security incidents. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on endpoint protection and device configuration, which are key aspects of incident response.
Malware Analyst
Malware Analysts investigate and analyze malicious software to develop defenses against them. Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune may be useful to this role as it provides training on endpoint protection, which is key to preventing and mitigating malware infections.

Reading list

We've selected one books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with Intune.
Microsoft Endpoint Manager: Device Configuration and...
Most relevant
Windows Endpoint Administration: Manage Applications
Most relevant
Microsoft Endpoint Manager: Compliance Policies with MECM...
Most relevant
Configure Windows Devices with Microsoft Intune
Most relevant
Managing iOS and Android Mobile Devices with Microsoft...
Most relevant
Microsoft Endpoint Manager: Introduction and Lab...
Most relevant
Windows Endpoint Administration: Manage Identity and...
Most relevant
Microsoft Endpoint Manager: Deploy Applications with...
Most relevant
Microsoft Endpoint Manager: Windows Updates and Servicing...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser