One of the most important requirements for organizations that wish to use Intune is the security baseline of the device. There are differences between the guidance provided by NCSC, CIS, and Microsoft’s pre-configured security baselines for Intune. This article explains the guidance from each organization, while providing a gap analysis between the baselines.
Taking Control of Your Unmanaged PCs with Intune
In a frantic rush to enable remote workers at the onset of the pandemic, many organizations were forced to ship devices directly to the user from the supplier without any prior configuration by IT. Administrators must take back control to properly secure and manage these devices. This article will show you how to regain control and prepare for scalable deployments consistent with corporate policy; reviews best practices for long-term management; and gets you thinking about how to protect your organization from this type of unmanaged situation in the future.
Windows 10 and Office 2019 Announcements Highlight the Importance of Managing Updates
Microsoft has announced updated servicing models for running Office 365 ProPlus on Windows 10, as well as the support and servicing of the Office 2019 release.
How to Use Azure Active Directory Conditional Access to Enforce Multi-Factor Authentication for Unmanaged Devices
How to use Azure Active Directory conditional access policies to enforce multi-factor authentication requirements when users login from unmanaged devices.