Book Image

Mastering Microsoft Endpoint Manager

By : Christiaan Brinkhoff, Per Larsen
5 (1)
Book Image

Mastering Microsoft Endpoint Manager

5 (1)
By: Christiaan Brinkhoff, Per Larsen

Overview of this book

Microsoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them. With this book, you’ll learn everything you need to know to make the shift to Modern Workplace, running Windows 10, Windows 11, or Windows 365. Mastering Microsoft Endpoint Manager explains various concepts in detail to give you the clarity to plan how to use Microsoft Endpoint Manager (MEM) and eliminate potential migration challenges beforehand. You'll get to grips with using new services such as Windows 365 Cloud PC, Windows Autopilot, profile management, monitoring and analytics, and Universal Print. The book will take you through the latest features and new Microsoft cloud services to help you to get to grips with the fundamentals of MEM and understand which services you can manage. Whether you are talking about physical or cloud endpoints—it’s all covered. By the end of the book, you'll be able to set up MEM and use it to run Windows 10, Windows 11, and Windows 365 efficiently.
Table of Contents (24 chapters)
1
Section 1: Understanding the Basics
4
Section 2: Windows 365
7
Section 3: Mastering Microsoft Endpoint Manager
19
Section 4: Tips and Tricks from the Field

Security baselines

Security baselines are preconfigured groups of Windows settings that help you apply the security settings that are recommended by the relevant security teams. The baselines you deploy can be customized to enforce only the settings and values required by you.

There are multiple security-related settings in Windows as well as for Microsoft Edge for your endpoints. Another great asset is the option to do versioning and filtering based on different OSes or scenarios that have to be stricter. You no longer have to use GPOs to ensure the security settings on your endpoints – just create a security baseline profile and you're all set.

Figure 13.46 – MDM security baselines

This concludes this security baseline overview. Next, we will cover compliance policies.