2/16/2023 0 Comments Eset endpoint security 6.1.2109![]() Integrate Intune with your Microsoft Defender for Endpoint team. When you integrate with Azure Active Directory (Azure AD) conditional access policies to enforce compliance policies, you can gate access to corporate resources for both managed devices, and devices that aren’t managed yet. Rules can include OS versions, password requirements, device threat-levels, and more. With compliance policies, you set the rules that devices and users must meet to be considered compliant. Each Endpoint security policy focuses on aspects of device security like antivirus, disk encryption, firewalls, and several areas made available through integration with Microsoft Defender for Endpoint.Įstablish device and user requirements through compliance policy. ![]() Manage security configurations on devices through tightly focused policies. Security baselines are pre-configured groups of Windows settings that help you apply a configuration that's recommended by the relevant security teams. ![]() Intune includes security baselines for Windows devices and a growing list of applications, like Microsoft Defender for Endpoint and Microsoft Edge. Then, drill-in to specific devices to understand which compliance policies aren't met so you can resolve them.ĭeploy security baselines that establish best practice security configurations for devices. Use the All devices view where you can view device compliance from a high level. Review the status of all your managed devices. The Endpoint security node groups the tools that are available through Intune that you’ll use to keep devices secure: The available tasks can help you identify at-risk devices, to remediate those devices, and restore them to a compliant or more secure state. The Endpoint security policies are designed to help you focus on the security of your devices and mitigate risk. As a Security Admin, use the Endpoint security node in Intune to configure device security and to manage security tasks for devices when those devices are at risk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |