Design a Device Compliance Architecture
Вставка
- Опубліковано 6 сер 2024
- A key part of Zero Trust architecture is to ensure the devices connecting to your environment are compliant with IT policy. Join me as we learn how to approach device compliance with Microsoft Endpoint Manager!
Link to deck:1drv.ms/p/s!AhzQ4p0K1fqij8ZNQ...
Gear:
-Sony A6400 4K DLSR
-Elgato Key Light
-Sigma 30mm 1.4f Lens
-Camtasia Editing Software
-Elgato 4K Capture Stick
-Blue Yeti Nano Mic
Table of Contents:
00:00:00 Intro
00:00:31 Define Your Strategy
00:05:32 Build Your Requirements
00:08:00 How Device Compliance Works
00:12:56 Configuration
00:15:20 3P MDM Provider
00:16:35 Defender Integration
00:17:43 3P Mobile Threat Defense Integration
00:18:30 Wrap Up - Наука та технологія
Thanks Matt, you are awesome and inspiring
This is completely relevant to what I'm trying to do right now
Thank you Matt! I would say discussions around third party MDM compliance integrations with Azure / Intune are definitely a focal point for most IT admins at the moment. Whether it is just leveraging Partner Device Compliance for conditional access (eg. Teams) or using it as a "bridge" for an eventual complete migration to Intune as an end-to-end UEM (from a MDM like MobileIron) - there's been alot of talk on technical forums. I personally will be boarding that latter boat very soon, and totally agree that defining requirements is absolute key. With iOS devices getting more popular in the workspace, would be great if we could see more in-depth videos around mobile device security and management! :)
Thanks Matt, great stuff as always. We use device compliance as with a CA policy to ensure only Managed devices and compliant area allowed to access Company resources. Otherwise they are denied access. Our client like that as it adds to the security layer of our Zero Trust framework
Thanks Matt, great timing! Covering Device Compliant as part of an overall project at the moment, it's a hard one to cover (corporate merger as well), sponsors techs and poc's all hard work, documenting it properly & testing is not to be under estimated, thanks for covering this as it's given me some ideas on potental solutions & tips to focus on, some ace pointers, thanks again! Your wrap up coverage - very true, that's probably one of the most important parts to cover (docs and ppl / planning)
Great insight Matt! This is highly appreciated. Does Meraki MDM work with intune compliance?
at 15:25 in the video you can see the screenshot of the 3rd party MDM providers that integrate with Microsoft Endpoint Manager
Does anyone know if I can use my company's email address to authenticate on my Mac? Like on my Windows PC I just use a PIN # my computer is on Azure AD, not in the local domain.