Description:Creating a secure baseline within Intune can be challenging, as can working with your security team! In this session, we'll dig into what challenges you might face, why your security team might have a problem with you managing your devices with Intune, and some best practices to adhere to secure frameworks such as NCSC, CIS, or NIST.
Learn how to approach building your own secure configuration and avoid painful lessons learned.
What you will learn:- Understanding gaps in security frameworks and bridging them.
- Collaboration is key to end-user device security.
- Best practices for building a secure configuration in Intune.
- Real-life scenarios and lessons learned to avoid common pitfalls.