![]() Then, drill-in to specific devices to understand which compliance policies aren't met so you can resolve them.ĭeploy security baselines that establish best practice security configurations for devices. Use the All devices view where you can view device compliance from a high level. Review the status of all your managed devices. The Endpoint security node groups the tools that are available through Intune that you’ll use to keep devices secure: The available tasks can help you identify at-risk devices, to remediate those devices, and restore them to a compliant or more secure state. The Endpoint security policies are designed to help you focus on the security of your devices and mitigate risk. ![]() As a Security Admin, use the Endpoint security node in Intune to configure device security and to manage security tasks for devices when those devices are at risk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |