Explore keeping your devices safe from malware and spam with Microsoft Intune Endpoint Protection, which allows you to control the security features on your Intune enrolled devices.
- [Instructor] If you've watched some of my other videos, you may already be familiar with Microsoft Intune. If you're new to Intune then Microsoft Intune is a cloud-based mobile device management solution that allow you to remotely manage, update and protect mobile devices and PCs. Endpoint Protection is part of the Intune suite and allows you to control the security features on your Intune enrolled devices. For example, you can require that Windows 10 devices are encrypted using BitLocker.
Endpoint protection allows you to protect your devices by configuring certain security attributes on your Intune enrolled devices. For example, this could be password protection or enforcing encryption. Windows 10 devices already now include the Microsoft Intune Endpoint Protection client software. Whereas other devices, such as the iPhone and earlier versions of Windows devices, will need the Intune agent installing this part of the device enrollment process.
When a device is enrolled into Intune, the Endpoint Protection client software is installed on the device. Once completed, it will benefit from real time protection against malware and it will be periodically scanned for harmful software such as viruses. On a regular basis, the device will sync with Intune, that is the mobile device management authority, or MDM. And Intune will ensure that client has the most up-to-date malware definitions.
These will be downloaded to the device automatically as part of the sync. Depending on the device platform that is enrolled, an administrator can configure security settings on the device. For Windows 10 devices, you can create an Endpoint Protection profile, which can then be applied to Windows 10 devices or groups of devices. Some examples of how this policy can be used include ensuring that all Windows 10 devices are encrypted using BitLocker, or that any removable storage used with the device, needs to be encrypted.
Instructor Andrew Bettany helps IT professionals responsible for their company's cloud master key skills related to managing Exchange Online, using antispam and antimalware resources, and configuring Endpoint Protection. Learn how to configure mailbox permissions and sharing, set up contacts and groups, configure antimalware filters in Office 365, and use Exchange Active Sync for mobile device management. Plus, learn how to use Intune Endpoint Protection, which allows you to control the security features on your Intune-enrolled devices and further protect them from malware and spam.
- Managing recipients and mailboxes
- Managing mailbox permissions and sharing
- Managing contacts and groups
- Exploring Exchange ActiveSync for mobile device management
- Leveraging antispam and antimalware features
- Using Microsoft Intune Endpoint Protection