Thank you kindly. I do appreciate a bit of diversity also. The fact is it doesn’t matter which device or browser who use, Microsoft 365 embodies different operating systems and browsers and ultimately its about how I can securely consume my data, the device doesn’t matter👍😊
I honestly I don’t know. I suspect so as it’s a cloud application. I never use yammer. I have to confess. More details and all the learning documentation can be found at learn.microsoft.com
Awesome, you are precise with word to word and this is completely understandable. Thanks a lot Andy. Could you please create video on sign in interactive and non interactive and risky users.
Thank you for these videos. Over the weekend I was looking at deploying Defender for Endpoint. It became clear that having InTune setup first would be best, but there were at least 3 portals I needed to get my head around :-). Needless to say I became confused :-)
Hi Dave I can understand. I've asked the team to simplify the portals and hopefully one day they will. Key thing to remember is that once you've assigned permissions in Azure AD, you can then manage the device and apps in Endpoint Manager, which is a combination of Intune and Endpoint security. Since this video was recorded I've uploaded quite a lot if updated content. You may want to check it out. Thanks for dropping by :-)
@@AndyMaloneMVP Hero, it seems to be an area that is harder to find training in than others. When I was totally new I struggled to see where baseline policies where, vs configuration policies or say ASR ones. Also what was defender vs what was intune. Enrolment methods and pros and cons, security recommendations and secure score. Just thought id point out what I wish I understood day 1 :)
I have a question. If you have set a conditional access policy in Azure conditional access, ow does it affect Intune conditional access? Or are they the same? Like if you create a conditionl access in Intune it is also added in the Azure conditional access dashboard for list of conditional access policies?
Are proprietary apps that may not be on App store be integrated in Microsoft Endpoint Manager? Is there a repository to dump the exe inside and deploy to endpoints?
Although endpoint manager is specifically designed for modern apps. You can deploy Win32 based apps using this method as well but they are limited please note this does not include EXE files on the NSI files. However you can repackage apps so that they can work. Please note that I believe that this it will be a temporary measure from Microsoft as this type of application is being Removed in order to favour in modern apps. You will see more of this later this year in the new Windows 10 X platform. In here older Windows applications will be containerised, I believe this is the future of what you’re looking for. There are plenty of documents on docs. Microsoft.com regarding this. Good luck.
@@AndyMaloneMVP thanks i will look it up. I am in chargr of reimaging my companies laptop and were talking about 50 everymonth. I am not allowed to delete the enrollment also in AD. I have to copy the uuid one by one of every laptop and type them in the idp tool. Just to delete the device in AD.
Using Chrome on a Mac to do a Microsoft tutorial. I appreciate your diversity sir and will be checking out more of your uploads.
Thank you kindly. I do appreciate a bit of diversity also. The fact is it doesn’t matter which device or browser who use, Microsoft 365 embodies different operating systems and browsers and ultimately its about how I can securely consume my data, the device doesn’t matter👍😊
Excellent. This is really helpful. You clearly know what you are doing and crucially the way you speak is very clear and concise. Thanks so much.
you're very welcome and I'm delighted to be of help.
Thank you. Overall a helpful video. Simple and to the point.
You're welcome!
Thanks Andy i am just newto this and it making sense now
Glad to help
Excellent explanation! This helps with my research paper allot! Man, the stuff they don't teach in school...
Thank you, this is helpful!
You’re very welcome 😊
Nice video. Great overview. Makes me smile that you use a Mac as an MVP.
Microsoft 365 Security & Identity
Why? I’m a cloud & security MVP not Windows 😀
Great video. Helped me a lot. If you can please increase the recording quality to 1080p for future videos.
looks fine
thanks
Fantastic Information. Just starting out in a new job which will require good knowledge on this. Thanks alot
You’re welcome and good luck
Brilliant video
Very well explained Andy, Is it possible to add Yammer application in deployment ?
I honestly I don’t know. I suspect so as it’s a cloud application. I never use yammer. I have to confess. More details and all the learning documentation can be found at learn.microsoft.com
Awesome, you are precise with word to word and this is completely understandable. Thanks a lot Andy.
Could you please create video on sign in interactive and non interactive and risky users.
Thank you Sir and sure. Can do that 😊
Thank you for these videos. Over the weekend I was looking at deploying Defender for Endpoint. It became clear that having InTune setup first would be best, but there were at least 3 portals I needed to get my head around :-). Needless to say I became confused :-)
Hi Dave I can understand. I've asked the team to simplify the portals and hopefully one day they will. Key thing to remember is that once you've assigned permissions in Azure AD, you can then manage the device and apps in Endpoint Manager, which is a combination of Intune and Endpoint security. Since this video was recorded I've uploaded quite a lot if updated content. You may want to check it out. Thanks for dropping by :-)
Any update video on this now things have moved on? Just found and love your channel!
Hey welcome, sure I can an update. Stay tuned👍😀
@@AndyMaloneMVP Hero, it seems to be an area that is harder to find training in than others. When I was totally new I struggled to see where baseline policies where, vs configuration policies or say ASR ones. Also what was defender vs what was intune. Enrolment methods and pros and cons, security recommendations and secure score. Just thought id point out what I wish I understood day 1 :)
Have you done a video looking at setting up Defender for Endpoint?
I'll add it to my list Dave :-)
I have a question. If you have set a conditional access policy in Azure conditional access, ow does it affect Intune conditional access? Or are they the same? Like if you create a conditionl access in Intune it is also added in the Azure conditional access dashboard for list of conditional access policies?
They are the same 😊
@@AndyMaloneMVP thanks Andy 🙂
@@JustSaying290 you’re welcome 😊
Are E5 licnces finished now?
No
How granular is it to manage Mac OS/iOS devices? is it better than JAMF?
You can incorporate Jamf into I tune but too be honest. Think it does a great job on its own.
Are proprietary apps that may not be on App store be integrated in Microsoft Endpoint Manager? Is there a repository to dump the exe inside and deploy to endpoints?
Although endpoint manager is specifically designed for modern apps. You can deploy Win32 based apps using this method as well but they are limited please note this does not include EXE files on the NSI files. However you can repackage apps so that they can work. Please note that I believe that this it will be a temporary measure from Microsoft as this type of application is being Removed in order to favour in modern apps. You will see more of this later this year in the new Windows 10 X platform. In here older Windows applications will be containerised, I believe this is the future of what you’re looking for. There are plenty of documents on docs. Microsoft.com regarding this. Good luck.
Olá, você pode me dá alguns minutos para conversar sobre o Endpoint Manager?
Sure ask Qs either or on Twitter. But in English if possible :-)
Microsoft Endpoint Manager is a wonderful tool for a org but if a IT person doesnt have any elevated rights then it becomes so useless.
Here is an article that you may find useful learn.microsoft.com/en-us/mem/intune/fundamentals/role-based-
@@AndyMaloneMVP thanks i will look it up. I am in chargr of reimaging my companies laptop and were talking about 50 everymonth. I am not allowed to delete the enrollment also in AD. I have to copy the uuid one by one of every laptop and type them in the idp tool. Just to delete the device in AD.