Design a Device Compliance Architecture

Поділитися
Вставка
  • Опубліковано 6 сер 2024
  • A key part of Zero Trust architecture is to ensure the devices connecting to your environment are compliant with IT policy. Join me as we learn how to approach device compliance with Microsoft Endpoint Manager!
    Link to deck:1drv.ms/p/s!AhzQ4p0K1fqij8ZNQ...
    Gear:
    -Sony A6400 4K DLSR
    -Elgato Key Light
    -Sigma 30mm 1.4f Lens
    -Camtasia Editing Software
    -Elgato 4K Capture Stick
    -Blue Yeti Nano Mic
    Table of Contents:
    00:00:00 Intro
    00:00:31 Define Your Strategy
    00:05:32 Build Your Requirements
    00:08:00 How Device Compliance Works
    00:12:56 Configuration
    00:15:20 3P MDM Provider
    00:16:35 Defender Integration
    00:17:43 3P Mobile Threat Defense Integration
    00:18:30 Wrap Up
  • Наука та технологія

КОМЕНТАРІ • 7

  • @simonkeen9776
    @simonkeen9776 Рік тому

    Thanks Matt, you are awesome and inspiring
    This is completely relevant to what I'm trying to do right now

  • @groovieXL
    @groovieXL Рік тому

    Thank you Matt! I would say discussions around third party MDM compliance integrations with Azure / Intune are definitely a focal point for most IT admins at the moment. Whether it is just leveraging Partner Device Compliance for conditional access (eg. Teams) or using it as a "bridge" for an eventual complete migration to Intune as an end-to-end UEM (from a MDM like MobileIron) - there's been alot of talk on technical forums. I personally will be boarding that latter boat very soon, and totally agree that defining requirements is absolute key. With iOS devices getting more popular in the workspace, would be great if we could see more in-depth videos around mobile device security and management! :)

  • @ashok714
    @ashok714 2 роки тому +2

    Thanks Matt, great stuff as always. We use device compliance as with a CA policy to ensure only Managed devices and compliant area allowed to access Company resources. Otherwise they are denied access. Our client like that as it adds to the security layer of our Zero Trust framework

  • @andrewmccallum5699
    @andrewmccallum5699 2 роки тому +2

    Thanks Matt, great timing! Covering Device Compliant as part of an overall project at the moment, it's a hard one to cover (corporate merger as well), sponsors techs and poc's all hard work, documenting it properly & testing is not to be under estimated, thanks for covering this as it's given me some ideas on potental solutions & tips to focus on, some ace pointers, thanks again! Your wrap up coverage - very true, that's probably one of the most important parts to cover (docs and ppl / planning)

  • @christopherPoluyi
    @christopherPoluyi 2 роки тому +1

    Great insight Matt! This is highly appreciated. Does Meraki MDM work with intune compliance?

    • @MattSoseman
      @MattSoseman  2 роки тому +2

      at 15:25 in the video you can see the screenshot of the 3rd party MDM providers that integrate with Microsoft Endpoint Manager

  • @diaz8712
    @diaz8712 Рік тому +1

    Does anyone know if I can use my company's email address to authenticate on my Mac? Like on my Windows PC I just use a PIN # my computer is on Azure AD, not in the local domain.