We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Microsoft Endpoint Manager

Compliance Policies with MECM and Intune

Greg Shields

Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant.

Read more

Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant.

The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will.

In this thirteenth course out of sixteen, Microsoft Endpoint Manager: Compliance Policies with MECM and Intune, you'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations. First, you'll start by looking at compliance in MECM. Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective. Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance. You'll create and deploy Intune compliance policies to see their effect on user's machines. Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant. By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune.

Enroll now

What's inside

Syllabus

Course Overview
Introduction
Configure Compliance Rules with MECM
Configure Compliance Policies and Conditional Access with Intune
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches essential compliance concepts and practices for IT professionals
Builds a solid foundation in device configuration and compliance management
Instructors are recognized experts in Microsoft Endpoint Manager
Requires some prior experience in Microsoft Endpoint Manager
Focuses on MECM and Intune, which may not be relevant to all organizations

Save this course

Save Microsoft Endpoint Manager: Compliance Policies with MECM and Intune to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Microsoft Endpoint Manager: Compliance Policies with MECM and Intune. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Microsoft Endpoint Manager: Compliance Policies with MECM and Intune will develop knowledge and skills that may be useful to these careers:
Information Governance Manager
Information Governance Managers develop and implement policies and procedures to ensure that an organization's information is managed in a consistent and compliant manner. This course may be useful for Information Governance Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Network Administrator
Network Administrators are responsible for the design, implementation, and maintenance of computer networks. This course may be useful for Network Administrators by helping them to understand the compliance requirements for endpoint devices and how to configure and manage them to ensure compliance.
Risk Manager
Risk Managers identify, assess, and manage risks to an organization. This course may be useful for Risk Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
IT Manager
IT Managers plan, direct, and coordinate the activities of an organization's information technology department. This course may be useful for IT Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Security Engineer
Security Engineers design, implement, and maintain security systems and controls to protect an organization's information and assets. This course may be useful for Security Engineers by helping them to understand how to develop and implement compliance policies for endpoint devices.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation and maintenance of computer systems and networks. This course may be useful for Systems Administrators by helping them to understand the compliance requirements for endpoint devices and how to configure and manage them to ensure compliance.
Privacy Analyst
Privacy Analysts help organizations to comply with privacy laws and regulations. This course may be useful for Privacy Analysts by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Compliance Officer
Compliance Officers are responsible for ensuring that their organization's policies, procedures, and activities are in compliance with applicable laws, regulations, and standards. This course may be useful for Compliance Officers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for identifying, analyzing, and responding to cybersecurity threats. This course may be useful for Cybersecurity Analysts by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
IT Auditor
IT Auditors evaluate an organization's information systems and controls to ensure that they are operating effectively and efficiently. This course may be useful for IT Auditors by helping them to understand the compliance requirements for endpoint devices and how to assess compliance.
Compliance Analyst
Compliance Analysts are responsible for ensuring that their organization's policies, procedures, and activities are in compliance with applicable laws, regulations, and standards. This course may be useful for Compliance Analysts by helping them to understand how to develop and implement compliance policies for endpoint devices.
Information Security Manager
Information Security Managers are responsible for planning, implementing, and managing an organization's information security program. This course may be useful for Information Security Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for developing and implementing an organization's information security strategy. This course may be useful for CISOs by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Data Protection Officer (DPO)
Data Protection Officers (DPOs) are responsible for protecting personal data and ensuring compliance with data protection laws and regulations. This course may be useful for DPOs by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
IT Security Analyst
IT Security Analysts develop, implement, test, and maintain information security systems and controls. This course may be useful for IT Security Analysts by helping them to identify and remediate non-compliant devices on the network. This could improve the organization's overall security posture.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Endpoint Manager: Compliance Policies with MECM and Intune.
Is useful as a reference for securing Microsoft Endpoint Manager. It covers many of the same topics as the course, such as compliance policies and conditional access, but it goes into more depth on security topics.
Focuses on mobile device management with Microsoft Endpoint Manager, providing a complementary perspective to the course's focus on compliance policies.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Endpoint Manager: Compliance Policies with MECM and Intune.
Microsoft Endpoint Manager: Intune Co-management with...
Most relevant
Microsoft Endpoint Manager: Device Configuration and...
Most relevant
Microsoft Endpoint Manager: Windows Updates and Servicing...
Most relevant
Microsoft Endpoint Manager: Cloud Management Gateway with...
Most relevant
Microsoft Endpoint Manager: Introduction and Lab...
Most relevant
Microsoft Endpoint Manager: Deploy Applications with...
Most relevant
Windows Endpoint Administration: Manage Identity and...
Most relevant
Configure Windows Devices with Microsoft Intune
Most relevant
Microsoft Endpoint Manager: Device Configuration and...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser