Whitepaper

Intune guide for Configuration Manager administrators

Microsoft MVPs are a valued resource within the IT community because of their dedication to learning how to use the industry’s leading tools. Microsoft Intune is one of those solutions that has been in use since 2011, yet there are still so many admins who have not adopted it for their business needs.

This guide by former MVP Ed Aldrich helps Configuration Manager admins learn about the benefits of Intune as well as best practices for long-term use. After reading this guide, you will have a better understanding of Intune’s features and functionality as well as a roadmap for implementation.

Fill in the form to download the whitepaper

Share this post

Share this post on your favourite social media platform.

Find this resource useful?

If so please click here

Related Content

On-demand Webinar

Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part 2

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence--73 percent of respondents to last year's survey said they were using…

On-demand Webinar

How Are You Responding to Threats: SANS 2018 Incident Response Survey Results Part 1

What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response…

Case Study

Uncle SAM: How AppClarity saved the US taxpayer millions at a leading federal agency

This US federal agency lacked the insight into their software estate required to manage their licenses. AppClarity was the answer to their troubles.

Case Study

Tachyon & ServiceNow: Driving full IT automation (with Nathan Dornbrook, ECS Security)

ServiceNow is an incredible orchestration and automation tool, while Tachyon enables users to execute almost any process on any endpoint. The integration of the two, therefore, is extremely powerful.

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your full digital estate, delivered at speed and at scale. We’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.