Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Mastering Microsoft Endpoint Manager
  • Toc
  • feedback
Mastering Microsoft Endpoint Manager

Mastering Microsoft Endpoint Manager

By : Per Larsen
4.5 (16)
close
Mastering Microsoft Endpoint Manager

Mastering Microsoft Endpoint Manager

4.5 (16)
By: Per Larsen

Overview of this book

Microsoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them. With this book, you’ll learn everything you need to know to make the shift to Modern Workplace, running Windows 10, Windows 11, or Windows 365. Mastering Microsoft Endpoint Manager explains various concepts in detail to give you the clarity to plan how to use Microsoft Endpoint Manager (MEM) and eliminate potential migration challenges beforehand. You'll get to grips with using new services such as Windows 365 Cloud PC, Windows Autopilot, profile management, monitoring and analytics, and Universal Print. The book will take you through the latest features and new Microsoft cloud services to help you to get to grips with the fundamentals of MEM and understand which services you can manage. Whether you are talking about physical or cloud endpoints—it’s all covered. By the end of the book, you'll be able to set up MEM and use it to run Windows 10, Windows 11, and Windows 365 efficiently.
Table of Contents (24 chapters)
close
1
Section 1: Understanding the Basics
4
Section 2: Windows 365
7
Section 3: Mastering Microsoft Endpoint Manager
19
Section 4: Tips and Tricks from the Field

What is zero trust?

In the past, when organizations created remote access to corporate networks, normally, access was effected with a VPN connection either on a corporate-owned or a personally owned Windows device, only secured by an MFA token.

Today, organizations require a new security model that effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.

This is the core of zero trust. Instead of believing that everything behind the corporate firewall is safe, the zero trust model assumes a breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates from or what resource it accesses, the zero trust model teaches us to "never trust, always verify."

Verifying identity

The majority of security breaches today involve credential theft, and lapses in cyber hygiene amplify the potential...

bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete