Book Image

Mastering Microsoft Endpoint Manager

By : Christiaan Brinkhoff, Per Larsen
5 (1)
Book Image

Mastering Microsoft Endpoint Manager

5 (1)
By: Christiaan Brinkhoff, Per Larsen

Overview of this book

Microsoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them. With this book, you’ll learn everything you need to know to make the shift to Modern Workplace, running Windows 10, Windows 11, or Windows 365. Mastering Microsoft Endpoint Manager explains various concepts in detail to give you the clarity to plan how to use Microsoft Endpoint Manager (MEM) and eliminate potential migration challenges beforehand. You'll get to grips with using new services such as Windows 365 Cloud PC, Windows Autopilot, profile management, monitoring and analytics, and Universal Print. The book will take you through the latest features and new Microsoft cloud services to help you to get to grips with the fundamentals of MEM and understand which services you can manage. Whether you are talking about physical or cloud endpoints—it’s all covered. By the end of the book, you'll be able to set up MEM and use it to run Windows 10, Windows 11, and Windows 365 efficiently.
Table of Contents (24 chapters)
1
Section 1: Understanding the Basics
4
Section 2: Windows 365
7
Section 3: Mastering Microsoft Endpoint Manager
19
Section 4: Tips and Tricks from the Field

Grant

You can select the following options as Conditional Access grant settings, of which MFA is the most common one to use:

  • Require MFA: Users must complete additional security requirements such as a phone call or text.
  • Require device to be marked as compliant: Device must be Intune-compliant. If the device is non-compliant, the user will be prompted to bring the device under compliance.
  • Require HAADJ device: Devices must be HAADJ to get access.
  • Require approved client app: Device must use these approved client applications.
  • Require app protection policy: The devices that you connect from must use policy-protected apps.

You could also select multiple controls, to force either multiple requirement options or one of multiple options, to provide access if multiple endpoint scenarios apply:

  • Require all the selected controls
  • Require one of the selected controls

    Note

    When selecting MFA and devices marked as compliant, you could lock yourself out...