From the course: Microsoft Cloud Fundamentals: Exchange Online and Security
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Microsoft Intune Endpoint Protection - Office 365 Tutorial
From the course: Microsoft Cloud Fundamentals: Exchange Online and Security
Microsoft Intune Endpoint Protection
- [Instructor] If you've watched some of my other videos in the library, you may already be familiar with Microsoft Intune. Microsoft Intune is a cloud-based mobile device management solution that allows you to remotely manage, update and protect mobile devices and PCs. Endpoint Protection management is a key component of Intune. Let's start by defining the term Endpoint Protection. The term endpoint is used to refer to the network endpoints such as servers, PCs, laptops and mobile devices. Endpoint protection, or sometimes known as endpoint security, is a system for managing the security of a network and the security of those endpoint devices which are connected to the network. With Intune, you can use device configuration profiles to manage Endpoint Protection settings. Using profiles, you can enable or disable settings and features on the devices within your organization. Let's take a look at device configuration…
Contents
-
-
-
-
-
-
-
-
Microsoft Threat Protection1m 11s
-
Microsoft Intune Endpoint Protection4m 15s
-
Demo: Device configuration profiles3m 13s
-
Demo: Restrict access to built-in apps2m 20s
-
Monitor Endpoint Protection5m 28s
-
Microsoft Intune security baselines1m 55s
-
Demo: Implement security baselines2m 32s
-
Microsoft Defender ATP6m 3s
-
Mobile Threat Defense integration with Intune2m 21s
-
-