Microsoft Intune | Part 2 | Level 200
Are you looking to enhance the security of your organization's endpoint devices? Join us for a webinar where we will show you how to plan and deploy a security endpoint baseline using Microsoft Intune. You will learn how to use Intune to enforce conditional access policies, ensuring that only authorized users and devices have access to your organization's resources. We will also cover the use of Intune for personal devices, including Windows, iOS and Android, and how to secure them to protect your organization's data. Course Outline Planning the endpoint baseline for security Using Intune for security baseline deployment Using Intune to enforce conditional access policies Intune for personal devices – Windows, iOS, Android Demos Setup security baseline compliance policies Setup conditional access policies that check Intune compliance Test conditional access policies Enroll users and devices in Intune Register and provide access to applications within the Company portal Create a conditional access policy to enforce Intune compliance Don't miss this opportunity to take your endpoint security to the next level with Microsoft Intune. Register now! Like what you see? Connect with us! Website: https://opsgility.com/ Contact Us: https://opsgility.com/contact Cloud Shows: https://opsgility.com/experttalks Live Courses: https://opsgility.com/aschedule Twitter: https://twitter.com/Opsgility Facebook: https://www.facebook.com/opsgility/ LinkedIn: https://www.linkedin.com/company/opsgility
Download
1 formatsVideo Formats
Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.