From the course: Microsoft Security Essentials: Concepts, Solutions, and AI-Powered Protection

Endpoint management and security with Microsoft Intune - Microsoft Security Copilot Tutorial

From the course: Microsoft Security Essentials: Concepts, Solutions, and AI-Powered Protection

Endpoint management and security with Microsoft Intune

- [Instructor] Let's look at the Endpoint Management and Security Capabilities Provided by Microsoft Intune. You may ask, what is an endpoint? From a security perspective, endpoints are devices that are used as entry points to an organization's on-premises and cloud environments. For example, laptops, desktops, virtual machines, mobile devices like smartphones and tablets. Why is endpoint management and security so important? Because these devices are distributed to a large number of users and may be used in various locations like employees' homes or airports. They are vulnerable to all kinds of cyber-attacks if not properly managed. Once compromised, they can be used as entry points for attackers to penetrate corporate networks. We have discussed the shared responsibility model in cloud computing. It's important to note that customers are always responsible for their own devices when accessing the cloud. So, managing and securing endpoints is critical to your overall security posture. This is where Microsoft Intune comes into play. It's a cloud-based endpoint management and security solution that provides the capabilities such as device management, app management, endpoint security, and endpoint analytics. In addition, Microsoft Intune is integrated with Microsoft Security Copilot, an AI-powered security analysis solution. With Security Copilot, you can use prompts to perform common tasks such as getting device details or summarizing a device policy. Now, let's take a quick tour of Microsoft Intune. Here's the Microsoft Intune Admin Center. Under Devices, you can essentially manage your organization's devices across various platforms, including Windows, iOS, macOS, Android, and Linux. Click all devices. You can view a list of enrolled devices. Select a device. You can explore with Copilot to summarize this device, analyze an error code, or compare this device with another device. You can monitor hardware, discover the apps, device configuration, and many more. Under Apps, you can deploy, update, and protect applications on your devices. Under endpoint security, you can configure device security policies and manage security tasks. Click all devices. You can view the compliance status. Click security baselines. You can apply Microsoft-recommended security configuration settings to your devices. And you can manage various security controls such as antivirus, disk encryption, and endpoint detection and response. Under reports, you can monitor the health and activity of your endpoints. Click endpoint analytics. You can access reports such as startup performance, application reliability, and work-from-anywhere score.

Contents