Summary

Completed

In this module, you learned about protecting your endpoint environment with Microsoft Intune. Here are some of the things you covered:

  • You used the Microsoft Intune admin center to configure the settings that are then applied based on the devices, apps, and users of your organization.
  • The settings that you assign are contained in policies that you create.
  • You assign the policies to groups that you define.
  • You can create and apply device policies as part of your efforts to protect endpoints.
  • Intune mobile application management (MAM) capabilities are supported whether you choose to enroll the device or not.
  • You can prevent data leaks and prevent unauthorized access by using Intune.
  • Endpoint management includes cloud endpoints, on-premises endpoints, cloud + on-premises endpoints, and co-management endpoints.
  • Platforms are the types of devices and the operating systems that are supported. Intune supports various Apple, Google, and Microsoft platforms.

Next steps

To continue learning about Microsoft Intune, see the next learning module in this series:

To evaluate Microsoft Intune and the Microsoft technologies available with Microsoft's Enterprise Mobility + Security (EMS), continue with the free trial:

To get expert guidance to help plan, deploy, and migrate your organization to Microsoft Intune, continue by learning more about FastTrack:

Learn more

For more information about Microsoft Intune, see the following resources: