Course Outline

Module 1: Introduction and Fundamentals

  • Overview of Microsoft Intune / Endpoint Manager for government use
  • Relationship with Configuration Manager (co-management, cloud attach)
  • Advantages of modern endpoint management in public sector environments
  • Fundamental concepts: devices, applications, data, and users
  • Intune architecture, roles, and licensing for government

Module 2: Identity and Access

  • Key concepts of Microsoft Entra ID / Azure AD for government
  • Synchronization from Active Directory to Entra ID (Azure AD Connect)
  • Device join types: Azure AD Join, Hybrid AD Join for secure access
  • Roles, groups, and permissions in Intune for enhanced governance
  • Conditional Access and its integration with Intune for robust security

Module 3: Device Enrollment

  • Enrollment methods for various operating systems (Windows, iOS, Android, macOS)
  • Concepts, profiles, and processes of Windows Autopilot for streamlined deployment
  • Automated enrollment with DEP (Apple) and Zero-touch (Android) for efficiency
  • Differentiating between personal device (BYOD) and corporate device management strategies
  • Comparing MDM (Mobile Device Management) and MAM (Mobile Application Management) approaches

Module 4: Configuration and Compliance Policies

  • Device compliance policies to ensure adherence to government standards
  • Configuration policies (Configuration Profiles) for consistent device settings
  • Device restrictions and security controls for enhanced protection
  • App Protection Policies to safeguard application data
  • Conditional access policies based on compliance for secure access

Module 5: Application Management

  • Types of applications supported by Intune: Line of Business (LOB), Win32, Microsoft Store, web apps
  • Processes for deployment, installation, uninstallation, and updating of applications in government environments
  • Application data protection strategies to ensure confidentiality
  • Differentiating application policies from corporate data management practices
  • License and assignment management for efficient resource allocation

Module 6: Updates and Patches

  • Integration of Windows Update for Business with Intune to maintain up-to-date systems
  • Feature and quality update policies for government devices
  • Deployment ring models for controlled rollouts
  • Monitoring update status to ensure compliance
  • Strategies for managing updates in corporate environments for government

Module 7: Security and Protection

  • Microsoft Defender for Endpoint integration with Intune for comprehensive security
  • Microsoft security baselines and templates for standardized protection
  • Threat protection measures (antimalware, firewall, etc.) for government devices
  • Device encryption (BitLocker) and encryption policies for data security
  • Certificate management and secure VPN/Wi-Fi profiles to enhance network security

Module 8: Monitoring, Reporting, and Troubleshooting

  • Dashboards and default reports for monitoring Intune performance
  • Logs and diagnostics (e.g., enrollment errors, policy management) for troubleshooting
  • Support and troubleshooting tools available in Intune for government IT staff
  • Use of administration portals (device portal, company portal) for user management
  • Alerts and notifications to proactively address issues

Module 9: Advanced Scenarios / Integrations

  • Co-management with Configuration Manager for hybrid environments
  • Device management without enrollment (“Autopilot for existing devices”) for flexibility
  • Integrations with other Microsoft services (Defender, Azure, Copilot, etc.) for enhanced functionality
  • Automation using PowerShell and Graph API for efficient operations
  • Governance strategies and enterprise-scale structures to ensure compliance and scalability
  • Best practices for designing and implementing Intune solutions in government organizations

Summary and Next Steps

Requirements

  • An understanding of Microsoft 365 and Azure environments for government
  • Experience with Windows or mobile device management in public sector settings
  • Familiarity with organizational IT security principles aligned with government standards

Audience

  • System administrators responsible for government operations
  • Endpoint management specialists supporting federal, state, and local agencies
  • IT professionals managing enterprise devices and security policies for government entities
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories