Book Image

Mastering Microsoft Endpoint Manager

By : Christiaan Brinkhoff, Per Larsen
5 (1)
Book Image

Mastering Microsoft Endpoint Manager

5 (1)
By: Christiaan Brinkhoff, Per Larsen

Overview of this book

Microsoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them. With this book, you’ll learn everything you need to know to make the shift to Modern Workplace, running Windows 10, Windows 11, or Windows 365. Mastering Microsoft Endpoint Manager explains various concepts in detail to give you the clarity to plan how to use Microsoft Endpoint Manager (MEM) and eliminate potential migration challenges beforehand. You'll get to grips with using new services such as Windows 365 Cloud PC, Windows Autopilot, profile management, monitoring and analytics, and Universal Print. The book will take you through the latest features and new Microsoft cloud services to help you to get to grips with the fundamentals of MEM and understand which services you can manage. Whether you are talking about physical or cloud endpoints—it’s all covered. By the end of the book, you'll be able to set up MEM and use it to run Windows 10, Windows 11, and Windows 365 efficiently.
Table of Contents (24 chapters)
1
Section 1: Understanding the Basics
4
Section 2: Windows 365
7
Section 3: Mastering Microsoft Endpoint Manager
19
Section 4: Tips and Tricks from the Field

Policy management

Using Microsoft Intune, a part of Microsoft Endpoint Manager, to manage your Windows 10 or 11 Enterprise desktops is all about standardizing and simplifying the management layer of your environment. In Chapter 9, Understanding Policy Management, we covered the basics of how MDM policies work on the client side. We also learned how to get started with MDM policy management either from scratch or with Group Policy analytics.

In this chapter, we will look at different ways to configure settings within Microsoft Intune. We will start with security baselines as those are best practices for securing your desktops.

Configuring a policy from the Endpoint Manager Security blade

You should start with a security baseline if your organization is ready for it. Let's say that your organization is already leveraging a Microsoft security baseline such as Center for Internet Security (CIS) Benchmarks. With GPOs today, you already know the impact that a security baseline...