We may earn an affiliate commission when you visit our partners.
Greg Shields

Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant.

The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will.

Read more

Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant.

The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will.

In this thirteenth course out of sixteen, Microsoft Endpoint Manager: Compliance Policies with MECM and Intune, you'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations. First, you'll start by looking at compliance in MECM. Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective. Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance. You'll create and deploy Intune compliance policies to see their effect on user's machines. Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant. By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune.

Enroll now

What's inside

Syllabus

Course Overview
Introduction
Configure Compliance Rules with MECM
Configure Compliance Policies and Conditional Access with Intune
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches essential compliance concepts and practices for IT professionals
Builds a solid foundation in device configuration and compliance management
Instructors are recognized experts in Microsoft Endpoint Manager
Requires some prior experience in Microsoft Endpoint Manager
Focuses on MECM and Intune, which may not be relevant to all organizations

Save this course

Save Microsoft Endpoint Manager: Compliance Policies with MECM and Intune to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft Endpoint Manager: Compliance Policies with MECM and Intune with these activities:
Review your knowledge of Microsoft Intune
Help you recall skills related to Microsoft Intune so that when they're addressed in the course you'll be able to follow along easier.
Browse courses on Microsoft Intune
Show steps
  • Refer to your notes from a previous course on Microsoft Intune or read a blog post summarizing the basics of Intune.
  • Set up a lab environment with Microsoft Intune to practice configuring and managing devices.
Organize your notes and resources
Help you stay organized and easily access the materials you need to succeed in the course.
Show steps
  • Review your notes and identify key concepts.
  • Create a system for organizing your notes, such as using folders or a note-taking app.
  • Organize your resources, such as lab exercises and tutorial links, in a central location.
Watch tutorials on Microsoft Endpoint Manager: Compliance Policies
Provide you with a deeper understanding of the concepts of compliance policies and how to configure them in Microsoft Endpoint Manager.
Show steps
  • Search for and watch video tutorials on YouTube or Microsoft Docs.
  • Take notes on the key concepts and steps involved in configuring compliance policies.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Discuss compliance policies with peers
Facilitate the exchange of knowledge and experiences, helping you gain a deeper understanding of compliance policies and their practical applications.
Browse courses on Compliance Policies
Show steps
  • Join or start a study group or online forum.
  • Discuss different compliance policies and their use cases.
  • Share tips and best practices for configuring and managing compliance policies.
Configure compliance policies in a lab environment
Allow you to practice configuring and managing compliance policies in a hands-on environment, reinforcing your understanding of the concepts.
Browse courses on Compliance Policies
Show steps
  • Create a test environment in Microsoft Endpoint Manager.
  • Configure compliance policies for different device settings.
  • Monitor and enforce compliance policies.
Create a cheat sheet for compliance policy settings
Help you memorize and quickly reference important compliance policy settings, making it easier to configure and manage compliance in your environment.
Browse courses on Compliance Policies
Show steps
  • Gather information on the most common compliance policy settings.
  • Create a table or document summarizing the settings, their descriptions, and their default values.
Participate in a compliance policy challenge
Provide you with a fun and engaging way to test your skills and knowledge of compliance policies, while potentially winning prizes or recognition.
Browse courses on Compliance Policies
Show steps
  • Locate or create a compliance policy challenge.
  • Configure compliance policies based on the challenge requirements.
  • Submit your policies and compete against others.
Contribute to an open-source compliance policy project
Allow you to contribute to the development and improvement of compliance policy tools and resources, while gaining practical experience in a real-world setting.
Browse courses on Compliance Policies
Show steps
  • Identify an open-source compliance policy project.
  • Contact the project maintainers and express your interest in contributing.
  • Start working on a specific task or feature.

Career center

Learners who complete Microsoft Endpoint Manager: Compliance Policies with MECM and Intune will develop knowledge and skills that may be useful to these careers:
Information Governance Manager
Information Governance Managers develop and implement policies and procedures to ensure that an organization's information is managed in a consistent and compliant manner. This course may be useful for Information Governance Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Network Administrator
Network Administrators are responsible for the design, implementation, and maintenance of computer networks. This course may be useful for Network Administrators by helping them to understand the compliance requirements for endpoint devices and how to configure and manage them to ensure compliance.
Risk Manager
Risk Managers identify, assess, and manage risks to an organization. This course may be useful for Risk Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
IT Manager
IT Managers plan, direct, and coordinate the activities of an organization's information technology department. This course may be useful for IT Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Security Engineer
Security Engineers design, implement, and maintain security systems and controls to protect an organization's information and assets. This course may be useful for Security Engineers by helping them to understand how to develop and implement compliance policies for endpoint devices.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation and maintenance of computer systems and networks. This course may be useful for Systems Administrators by helping them to understand the compliance requirements for endpoint devices and how to configure and manage them to ensure compliance.
Privacy Analyst
Privacy Analysts help organizations to comply with privacy laws and regulations. This course may be useful for Privacy Analysts by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Compliance Officer
Compliance Officers are responsible for ensuring that their organization's policies, procedures, and activities are in compliance with applicable laws, regulations, and standards. This course may be useful for Compliance Officers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for identifying, analyzing, and responding to cybersecurity threats. This course may be useful for Cybersecurity Analysts by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
IT Auditor
IT Auditors evaluate an organization's information systems and controls to ensure that they are operating effectively and efficiently. This course may be useful for IT Auditors by helping them to understand the compliance requirements for endpoint devices and how to assess compliance.
Compliance Analyst
Compliance Analysts are responsible for ensuring that their organization's policies, procedures, and activities are in compliance with applicable laws, regulations, and standards. This course may be useful for Compliance Analysts by helping them to understand how to develop and implement compliance policies for endpoint devices.
Information Security Manager
Information Security Managers are responsible for planning, implementing, and managing an organization's information security program. This course may be useful for Information Security Managers by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for developing and implementing an organization's information security strategy. This course may be useful for CISOs by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
Data Protection Officer (DPO)
Data Protection Officers (DPOs) are responsible for protecting personal data and ensuring compliance with data protection laws and regulations. This course may be useful for DPOs by helping them to understand the compliance requirements for endpoint devices and how to develop and implement compliance policies.
IT Security Analyst
IT Security Analysts develop, implement, test, and maintain information security systems and controls. This course may be useful for IT Security Analysts by helping them to identify and remediate non-compliant devices on the network. This could improve the organization's overall security posture.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Endpoint Manager: Compliance Policies with MECM and Intune.
Is useful as a reference for securing Microsoft Endpoint Manager. It covers many of the same topics as the course, such as compliance policies and conditional access, but it goes into more depth on security topics.
Focuses on mobile device management with Microsoft Endpoint Manager, providing a complementary perspective to the course's focus on compliance policies.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Endpoint Manager: Compliance Policies with MECM and Intune.
Microsoft Endpoint Manager: Intune Co-management with...
Most relevant
Microsoft Endpoint Manager: Device Configuration and...
Most relevant
Microsoft Endpoint Manager: Windows Updates and Servicing...
Most relevant
Microsoft Endpoint Manager: Cloud Management Gateway with...
Most relevant
Microsoft Endpoint Manager: Introduction and Lab...
Most relevant
Microsoft Endpoint Manager: Deploy Applications with...
Most relevant
Windows Endpoint Administration: Manage Identity and...
Most relevant
Configure Windows Devices with Microsoft Intune
Most relevant
Microsoft Endpoint Manager: Device Configuration and...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser