Mastering Intune for Enterprise Cloud Management
You're under pressure. Devices are being onboarded faster than you can secure them. Compliance alerts are piling up. Executives demand cloud-first strategies, but your endpoint management is falling behind. The risk of a breach, audit failure, or service disruption increases every day you delay. You're not alone. Over 74% of IT leaders report losing sleep over inconsistent device policies, unpatched endpoints, and shadow IT creeping into their environments. You need clarity. You need control. And most importantly, you need a system that works - not another theoretical framework that collapses under enterprise scale. Mastering Intune for Enterprise Cloud Management is your operational playbook. It’s the exact blueprint that transforms chaotic device sprawl into a fully governed, zero-trust-ready ecosystem - with complete policy automation, over-the-air deployment, and compliance enforcement - all within weeks, not quarters. One IT Director at a Fortune 500 manufacturing firm used this course to standardize 18,000+ hybrid devices in 43 countries. Within 21 days, they passed their first ISO 27001 audit with 98% policy adherence - a milestone their team had failed to achieve for three years. This course eliminates guesswork. You’ll gain a step-by-step methodology to design, deploy, and maintain an Intune environment that aligns with business continuity, regulatory demands, and Microsoft’s evolving cloud standards. No fluff. No gaps. Just proven execution. From day one, you’ll follow real-world workflows used by globally certified M365 Architects. The outcome? A board-ready Intune strategy, documented device lifecycle process, and automated compliance engine - all built by you, during the course. Here’s how this course is structured to help you get there.Course Format & Delivery Details Self-Paced. Immediate Access. Zero Compromise.
This is a self-paced, on-demand learning experience. Once enrolled, you’ll gain immediate online access to the full course materials. There are no fixed start dates, no mandatory live sessions, and no time pressure. You progress at your speed, on your schedule. Most learners complete the program in 6 to 8 weeks when dedicating 4–5 hours per week. However, many report applying critical configurations and seeing measurable improvements - such as reduced helpdesk tickets or faster deployment cycles - within the first 72 hours of starting Module 2. Lifetime Access & Continuous Updates
Your enrollment includes lifetime access to all course content. This means you never lose access to the modules, reference guides, templates, or tools - even after completion. As Microsoft updates Intune features, policies, and compliance frameworks, this course is updated accordingly. You’ll receive all enhancements, new content, and expanded scenarios automatically, at no extra cost. This is not a static resource. It evolves with your real-world needs. Available Anywhere. At Any Time.
Access your course 24/7 from any device - desktop, tablet, or mobile. The interface is fully responsive, allowing you to study during downtime, review policy checklists on the go, or pull up configuration steps during a deployment window. This is enterprise learning engineered for enterprise demands. Dedicated Instructor Support & Guided Outcomes
Even in a self-paced environment, you’re never alone. You’ll receive direct guidance from certified Microsoft 365 Enterprise Architects with over a decade of hands-on Intune deployment experience across regulated industries. Have a specific challenge with conditional access, app protection policies, or co-management? Submit your scenario and receive structured feedback, configuration walkthroughs, and policy design recommendations tailored to your environment. Certificate of Completion Issued by The Art of Service
Upon finishing the course and passing the final assessment, you’ll earn a globally recognised Certificate of Completion issued by The Art of Service. This credential verifies your mastery of enterprise-grade Intune deployment, policy lifecycle management, and cloud compliance integration - skills validated by thousands of professionals in over 120 countries. Employers, auditors, and certification bodies recognise The Art of Service as a benchmark for operational excellence in IT service management. No Hidden Fees. No Surprises.
The pricing for Mastering Intune for Enterprise Cloud Management is straightforward. What you see is what you get. There are no recurring charges, hidden subscriptions, or add-on costs. One payment, full access. We accept all major payment methods including Visa, Mastercard, and PayPal. Your transaction is processed securely via PCI-compliant gateways. 100% Money-Back Guarantee: Satisfied or Refunded
We eliminate your risk with a full money-back guarantee. If you complete the first two modules and feel the course isn’t delivering actionable value, simply request a refund. No questions, no forms, no hoops to jump through. This is not just a promise - it’s a statement of confidence in the course’s real-world ROI. What Happens After Enrollment?
Shortly after registration, you’ll receive a confirmation email. Your course access details, login instructions, and onboarding guide will be sent separately once your learner profile is fully provisioned. This ensures a seamless, secure setup process. “Will This Work For Me?” - Addressing Your Biggest Concern
You might be thinking: “I work in a hybrid environment with legacy GPOs. Can this really apply to me?” Absolutely. This course is built for complexity. Whether you’re supporting 200 or 200,000 devices, managing BYOD and corporate-owned fleets, operating in air-gapped networks, or transitioning from SCCM, the frameworks here are designed to integrate seamlessly. This works even if: You’re new to Intune, your organization lacks a cloud governance board, or you’re the only IT pro responsible for endpoint strategy. The step-by-step implementation guides, decision matrices, and scalable architecture templates ensure success regardless of team size or infrastructure maturity. One Senior Systems Administrator in the Australian healthcare sector used these methods to migrate 4,700 clinical devices off SCCM without service interruption - despite having no prior Intune experience and a six-week window before audit season. We’ve engineered this course to remove friction, reduce risk, and deliver immediate clarity. Your confidence in managing enterprise endpoints will grow with every module.
Module 1: Foundations of Modern Endpoint Management - Understanding the shift from on-prem to cloud-first device management
- Key drivers for Intune adoption in enterprise environments
- Differences between Group Policy and MDM policy enforcement
- Intune licensing models and role-based access control planning
- Core components: Tenant administration, Azure AD integration, and device enrollment
- Overview of Microsoft Endpoint Manager admin center architecture
- Introduction to co-management with Configuration Manager
- Setting up a lab environment using Microsoft 365 Developer Program
- Navigating the admin center: Key dashboards and health monitoring
- Best practices for organizing administrative roles and permissions
- Multi-tenant considerations for MSPs and global enterprises
- Establishing a change control process for Intune configurations
- Creating your first device compliance policy
- Baseline security settings every organisation must configure
- Initial assessment: Scanning your current device estate for readiness
Module 2: Device Enrollment & Lifecycle Automation - Types of device enrollment: Corporate, BYOD, and shared devices
- Azure AD join vs Hybrid Azure AD join configurations
- Automated device enrollment using Windows Autopilot
- Creating and assigning Autopilot deployment profiles
- Handling macOS and iOS device enrollment at scale
- Android Enterprise ownership models: COPE, Work Profile, and fully managed
- Zero-touch enrollment for Android and Apple Business Manager integration
- Enrollment restrictions and conditional access prerequisites
- Device naming conventions and inventory tagging strategies
- Managing device registration limits and cleanup policies
- Automated retirement workflows for offboarded employees
- Recovery scenarios for lost or stolen enrolled devices
- Enrollment troubleshooting: Common errors and resolution paths
- Setting up dynamic device groups for automated policy targeting
- Using PowerShell scripts to pre-stage device assignments
Module 3: Policy Design & Configuration Management - Overview of policy types: Configuration profiles, compliance policies, and security baselines
- Best practices for policy scoping and assignment
- Creating custom configuration profiles using OMA-URI
- Deploying Windows 10/11 security baselines via Microsoft templates
- Modifying baseline policies to meet industry-specific requirements
- Managing macOS security and privacy preferences through Intune
- iOS/iPadOS restrictions and supervised device configurations
- Android security policies: Device encryption, screen lock, and app permissions
- Using Settings Catalog for granular Windows policy control
- Comparison between legacy templates and Settings Catalog capabilities
- Creating policies for Edge browser, Office apps, and Windows Defender
- Managing Microsoft 365 Apps update rings via policy
- Policy conflict resolution and precedence rules
- Using filters and expressions for dynamic policy assignment
- Importing and exporting configuration profiles for version control
- Documenting policy changes and maintaining an audit trail
Module 4: Application Management at Scale - Application management fundamentals in Intune
- Types of app deployments: Store, line-of-business, Win32, and scripts
- Packaging Win32 apps for Intune deployment
- Using the Microsoft Win32 Content Prep Tool
- Configuring detection rules for Win32 app success verification
- Dependencies and prerequisite handling for complex installations
- Deploying MSI packages with command-line modifications
- Publishing internal web apps via Company Portal
- Managing Microsoft Store for Business apps
- Volume licensing considerations for third-party software
- Assigning apps to users vs. devices: Use cases and best practices
- Using PowerShell scripts for application pre- and post-install actions
- Monitoring app deployment status and remediation
- Mobile application management (MAM) without device enrollment
- App protection policies: Requiring PIN, preventing data leakage
- Conditional launch and app-level encryption controls
- Data transfer rules between managed and personal apps
- Managing app updates and retirement schedules
- Using App Configuration Policies for custom app settings
Module 5: Identity & Access Governance - Role of Azure AD in Intune-driven device management
- Device registration vs. device enrollment workflows
- Configuring hybrid identity with AD Connect
- Implementing device authentication certificates
- Trusted root and intermediate CA integration for secure connections
- Configuring device compliance as a condition for access
- Integration between Intune and Conditional Access policies
- Building Conditional Access rules for device state enforcement
- Multi-factor authentication requirements for enrolled devices
- Named locations and risk-based access policies
- Creating compliant device-only access scenarios
- Excluding break-glass accounts from strict policies
- Monitoring sign-in logs and device compliance impact
- Using Sign-in Frequency and Continuous Access Evaluation
- Preparing for zero-trust network access with device signals
Module 6: Security, Threat Protection & Compliance - Integrating Microsoft Defender for Endpoint with Intune
- Enabling threat-based conditional access using Defender data
- Automated investigation and remediation workflows
- Configuring endpoint detection and response (EDR) settings
- Managing real-time protection and scan schedules
- Antivirus policy enforcement across Windows and macOS
- Firewall configuration via Intune policy
- Disk encryption enforcement: BitLocker and FileVault
- Managing cloud-delivered protection and sample submission
- Using attack surface reduction (ASR) rules in enterprise environments
- Exploit protection settings for Office and Edge applications
- Monitoring device compliance with CIS benchmarks
- Mapping policies to regulatory standards: GDPR, HIPAA, NIST
- Generating compliance reports for audit evidence
- Using compliance score to prioritise risk reduction
- Remediation guidance for non-compliant devices
- Automated compliance policy updates via Microsoft recommendations
Module 7: Network Security & Connectivity Policies - Deploying Wi-Fi and VPN configurations via Intune
- Creating Wi-Fi profiles for enterprise WPA2-Enterprise networks
- Distributing certificate-based authentication for wireless access
- Configuring Always-On VPN for remote users
- Deploying IKEv2, L2TP, and SSTP VPN profiles
- Using per-app VPN for selective traffic tunneling
- Proxy configuration and automatic detection (PAC) deployment
- Managing DNS settings and network discovery options
- Configuring Ethernet and cellular data profiles
- Roaming and data usage controls for mobile devices
- Secure email and calendar connectivity (EAS) policies
- Integrating with third-party secure email gateways
- Managing certificate profiles for device and user authentication
- Auto-enrollment with NDES and certificate template mapping
- Revocation checking and certificate lifecycle management
Module 8: Reporting, Monitoring & Operational Excellence - Key metrics to monitor in Microsoft Endpoint Manager
- Using Device Overview dashboard for health assessment
- Interpreting device compliance and enrollment success rates
- Configuring proactive remediation with PowerShell scripts
- Setting up email alerts and action centers
- Using Log Analytics and Sentinel for advanced monitoring
- Integrating Power BI for custom reporting dashboards
- Exporting audit logs and tracking administrator activity
- Analysing policy deployment success and failure patterns
- Device inventory reporting: OS versions, disk encryption, and hardware
- Application installation success and failure reports
- Conditional Access and compliance policy impact analysis
- Detecting misconfigurations using Baseline Compliance Reports
- Troubleshooting sync issues and policy application delays
- Using Remote Help for Windows device support
- Managing device lock and passcode reset requests
- Viewing device logs and diagnostic data securely
- Incident response workflows using Intune data
Module 9: Advanced Automation & DevOps Integration - Introduction to Infrastructure as Code (IaC) for Intune
- Using Microsoft Graph API to automate policy creation
- Exporting and importing policies via Graph Explorer
- Scripting bulk operations with PowerShell and Intune PowerShell SDK
- Automating device group creation based on Azure AD attributes
- Version controlling policies using GitHub and Azure Repos
- Setting up CI/CD pipelines for policy deployment
- Using Azure Automation Runbooks for scheduled tasks
- Automated compliance drift detection and correction
- Integrating with ServiceNow for ticketing workflows
- Building self-service actions in Power Automate
- Creating approval workflows for high-risk changes
- Automating decommissioning tasks upon offboarding
- Using Logic Apps to connect Intune with other systems
- Monitoring API usage and rate limits
- Documentation automation: Generating living policy playbooks
Module 10: Co-Management & Hybrid Environment Strategy - Designing a co-management strategy with Configuration Manager
- Workload distribution: What to manage in Intune vs SCCM
- Enabling co-management on existing ConfigMgr clients
- Choosing which workloads to offload first: Driver management, policies, updates
- Deploying Windows quality and feature updates via Intune
- Managing update rings and deferral policies
- Monitoring Windows Update for Business (WUfB) performance
- Using Update Compliance in Azure Monitor for insights
- Phased deployment strategies for major OS upgrades
- Disaster recovery planning for Windows servicing
- Uninstalling ConfigMgr client post-migration
- Migrating application deployments from SCCM to Intune
- Handling legacy installer types not supported in Intune
- Managing software distribution during transition
- Communicating change to end users and helpdesk teams
Module 11: Industry-Specific Deployment Patterns - Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site
Module 12: Certification Preparation & Final Implementation Project - Mapping course content to Microsoft certification paths
- Key topics for MD-102: Endpoint Administrator Associate
- Practice scenarios for real-world troubleshooting
- Documentation standards for enterprise change requests
- Building your final implementation project
- Selecting a use case: e.g. secure remote workforce onboarding
- Designing policy sets for a target user group
- Creating conditional access rules with compliance checks
- Deploying applications and security baselines
- Setting up monitoring and alerting workflows
- Documenting your architecture and decision rationale
- Submitting for review and feedback from instructors
- Revising based on expert recommendations
- Final verification and completion checklist
- Earning your Certificate of Completion issued by The Art of Service
- Career advancement pathways: Next certifications, roles, and specialisations
- Joining the alumni network for ongoing support
- Accessing member-exclusive templates and policy libraries
- Understanding the shift from on-prem to cloud-first device management
- Key drivers for Intune adoption in enterprise environments
- Differences between Group Policy and MDM policy enforcement
- Intune licensing models and role-based access control planning
- Core components: Tenant administration, Azure AD integration, and device enrollment
- Overview of Microsoft Endpoint Manager admin center architecture
- Introduction to co-management with Configuration Manager
- Setting up a lab environment using Microsoft 365 Developer Program
- Navigating the admin center: Key dashboards and health monitoring
- Best practices for organizing administrative roles and permissions
- Multi-tenant considerations for MSPs and global enterprises
- Establishing a change control process for Intune configurations
- Creating your first device compliance policy
- Baseline security settings every organisation must configure
- Initial assessment: Scanning your current device estate for readiness
Module 2: Device Enrollment & Lifecycle Automation - Types of device enrollment: Corporate, BYOD, and shared devices
- Azure AD join vs Hybrid Azure AD join configurations
- Automated device enrollment using Windows Autopilot
- Creating and assigning Autopilot deployment profiles
- Handling macOS and iOS device enrollment at scale
- Android Enterprise ownership models: COPE, Work Profile, and fully managed
- Zero-touch enrollment for Android and Apple Business Manager integration
- Enrollment restrictions and conditional access prerequisites
- Device naming conventions and inventory tagging strategies
- Managing device registration limits and cleanup policies
- Automated retirement workflows for offboarded employees
- Recovery scenarios for lost or stolen enrolled devices
- Enrollment troubleshooting: Common errors and resolution paths
- Setting up dynamic device groups for automated policy targeting
- Using PowerShell scripts to pre-stage device assignments
Module 3: Policy Design & Configuration Management - Overview of policy types: Configuration profiles, compliance policies, and security baselines
- Best practices for policy scoping and assignment
- Creating custom configuration profiles using OMA-URI
- Deploying Windows 10/11 security baselines via Microsoft templates
- Modifying baseline policies to meet industry-specific requirements
- Managing macOS security and privacy preferences through Intune
- iOS/iPadOS restrictions and supervised device configurations
- Android security policies: Device encryption, screen lock, and app permissions
- Using Settings Catalog for granular Windows policy control
- Comparison between legacy templates and Settings Catalog capabilities
- Creating policies for Edge browser, Office apps, and Windows Defender
- Managing Microsoft 365 Apps update rings via policy
- Policy conflict resolution and precedence rules
- Using filters and expressions for dynamic policy assignment
- Importing and exporting configuration profiles for version control
- Documenting policy changes and maintaining an audit trail
Module 4: Application Management at Scale - Application management fundamentals in Intune
- Types of app deployments: Store, line-of-business, Win32, and scripts
- Packaging Win32 apps for Intune deployment
- Using the Microsoft Win32 Content Prep Tool
- Configuring detection rules for Win32 app success verification
- Dependencies and prerequisite handling for complex installations
- Deploying MSI packages with command-line modifications
- Publishing internal web apps via Company Portal
- Managing Microsoft Store for Business apps
- Volume licensing considerations for third-party software
- Assigning apps to users vs. devices: Use cases and best practices
- Using PowerShell scripts for application pre- and post-install actions
- Monitoring app deployment status and remediation
- Mobile application management (MAM) without device enrollment
- App protection policies: Requiring PIN, preventing data leakage
- Conditional launch and app-level encryption controls
- Data transfer rules between managed and personal apps
- Managing app updates and retirement schedules
- Using App Configuration Policies for custom app settings
Module 5: Identity & Access Governance - Role of Azure AD in Intune-driven device management
- Device registration vs. device enrollment workflows
- Configuring hybrid identity with AD Connect
- Implementing device authentication certificates
- Trusted root and intermediate CA integration for secure connections
- Configuring device compliance as a condition for access
- Integration between Intune and Conditional Access policies
- Building Conditional Access rules for device state enforcement
- Multi-factor authentication requirements for enrolled devices
- Named locations and risk-based access policies
- Creating compliant device-only access scenarios
- Excluding break-glass accounts from strict policies
- Monitoring sign-in logs and device compliance impact
- Using Sign-in Frequency and Continuous Access Evaluation
- Preparing for zero-trust network access with device signals
Module 6: Security, Threat Protection & Compliance - Integrating Microsoft Defender for Endpoint with Intune
- Enabling threat-based conditional access using Defender data
- Automated investigation and remediation workflows
- Configuring endpoint detection and response (EDR) settings
- Managing real-time protection and scan schedules
- Antivirus policy enforcement across Windows and macOS
- Firewall configuration via Intune policy
- Disk encryption enforcement: BitLocker and FileVault
- Managing cloud-delivered protection and sample submission
- Using attack surface reduction (ASR) rules in enterprise environments
- Exploit protection settings for Office and Edge applications
- Monitoring device compliance with CIS benchmarks
- Mapping policies to regulatory standards: GDPR, HIPAA, NIST
- Generating compliance reports for audit evidence
- Using compliance score to prioritise risk reduction
- Remediation guidance for non-compliant devices
- Automated compliance policy updates via Microsoft recommendations
Module 7: Network Security & Connectivity Policies - Deploying Wi-Fi and VPN configurations via Intune
- Creating Wi-Fi profiles for enterprise WPA2-Enterprise networks
- Distributing certificate-based authentication for wireless access
- Configuring Always-On VPN for remote users
- Deploying IKEv2, L2TP, and SSTP VPN profiles
- Using per-app VPN for selective traffic tunneling
- Proxy configuration and automatic detection (PAC) deployment
- Managing DNS settings and network discovery options
- Configuring Ethernet and cellular data profiles
- Roaming and data usage controls for mobile devices
- Secure email and calendar connectivity (EAS) policies
- Integrating with third-party secure email gateways
- Managing certificate profiles for device and user authentication
- Auto-enrollment with NDES and certificate template mapping
- Revocation checking and certificate lifecycle management
Module 8: Reporting, Monitoring & Operational Excellence - Key metrics to monitor in Microsoft Endpoint Manager
- Using Device Overview dashboard for health assessment
- Interpreting device compliance and enrollment success rates
- Configuring proactive remediation with PowerShell scripts
- Setting up email alerts and action centers
- Using Log Analytics and Sentinel for advanced monitoring
- Integrating Power BI for custom reporting dashboards
- Exporting audit logs and tracking administrator activity
- Analysing policy deployment success and failure patterns
- Device inventory reporting: OS versions, disk encryption, and hardware
- Application installation success and failure reports
- Conditional Access and compliance policy impact analysis
- Detecting misconfigurations using Baseline Compliance Reports
- Troubleshooting sync issues and policy application delays
- Using Remote Help for Windows device support
- Managing device lock and passcode reset requests
- Viewing device logs and diagnostic data securely
- Incident response workflows using Intune data
Module 9: Advanced Automation & DevOps Integration - Introduction to Infrastructure as Code (IaC) for Intune
- Using Microsoft Graph API to automate policy creation
- Exporting and importing policies via Graph Explorer
- Scripting bulk operations with PowerShell and Intune PowerShell SDK
- Automating device group creation based on Azure AD attributes
- Version controlling policies using GitHub and Azure Repos
- Setting up CI/CD pipelines for policy deployment
- Using Azure Automation Runbooks for scheduled tasks
- Automated compliance drift detection and correction
- Integrating with ServiceNow for ticketing workflows
- Building self-service actions in Power Automate
- Creating approval workflows for high-risk changes
- Automating decommissioning tasks upon offboarding
- Using Logic Apps to connect Intune with other systems
- Monitoring API usage and rate limits
- Documentation automation: Generating living policy playbooks
Module 10: Co-Management & Hybrid Environment Strategy - Designing a co-management strategy with Configuration Manager
- Workload distribution: What to manage in Intune vs SCCM
- Enabling co-management on existing ConfigMgr clients
- Choosing which workloads to offload first: Driver management, policies, updates
- Deploying Windows quality and feature updates via Intune
- Managing update rings and deferral policies
- Monitoring Windows Update for Business (WUfB) performance
- Using Update Compliance in Azure Monitor for insights
- Phased deployment strategies for major OS upgrades
- Disaster recovery planning for Windows servicing
- Uninstalling ConfigMgr client post-migration
- Migrating application deployments from SCCM to Intune
- Handling legacy installer types not supported in Intune
- Managing software distribution during transition
- Communicating change to end users and helpdesk teams
Module 11: Industry-Specific Deployment Patterns - Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site
Module 12: Certification Preparation & Final Implementation Project - Mapping course content to Microsoft certification paths
- Key topics for MD-102: Endpoint Administrator Associate
- Practice scenarios for real-world troubleshooting
- Documentation standards for enterprise change requests
- Building your final implementation project
- Selecting a use case: e.g. secure remote workforce onboarding
- Designing policy sets for a target user group
- Creating conditional access rules with compliance checks
- Deploying applications and security baselines
- Setting up monitoring and alerting workflows
- Documenting your architecture and decision rationale
- Submitting for review and feedback from instructors
- Revising based on expert recommendations
- Final verification and completion checklist
- Earning your Certificate of Completion issued by The Art of Service
- Career advancement pathways: Next certifications, roles, and specialisations
- Joining the alumni network for ongoing support
- Accessing member-exclusive templates and policy libraries
- Overview of policy types: Configuration profiles, compliance policies, and security baselines
- Best practices for policy scoping and assignment
- Creating custom configuration profiles using OMA-URI
- Deploying Windows 10/11 security baselines via Microsoft templates
- Modifying baseline policies to meet industry-specific requirements
- Managing macOS security and privacy preferences through Intune
- iOS/iPadOS restrictions and supervised device configurations
- Android security policies: Device encryption, screen lock, and app permissions
- Using Settings Catalog for granular Windows policy control
- Comparison between legacy templates and Settings Catalog capabilities
- Creating policies for Edge browser, Office apps, and Windows Defender
- Managing Microsoft 365 Apps update rings via policy
- Policy conflict resolution and precedence rules
- Using filters and expressions for dynamic policy assignment
- Importing and exporting configuration profiles for version control
- Documenting policy changes and maintaining an audit trail
Module 4: Application Management at Scale - Application management fundamentals in Intune
- Types of app deployments: Store, line-of-business, Win32, and scripts
- Packaging Win32 apps for Intune deployment
- Using the Microsoft Win32 Content Prep Tool
- Configuring detection rules for Win32 app success verification
- Dependencies and prerequisite handling for complex installations
- Deploying MSI packages with command-line modifications
- Publishing internal web apps via Company Portal
- Managing Microsoft Store for Business apps
- Volume licensing considerations for third-party software
- Assigning apps to users vs. devices: Use cases and best practices
- Using PowerShell scripts for application pre- and post-install actions
- Monitoring app deployment status and remediation
- Mobile application management (MAM) without device enrollment
- App protection policies: Requiring PIN, preventing data leakage
- Conditional launch and app-level encryption controls
- Data transfer rules between managed and personal apps
- Managing app updates and retirement schedules
- Using App Configuration Policies for custom app settings
Module 5: Identity & Access Governance - Role of Azure AD in Intune-driven device management
- Device registration vs. device enrollment workflows
- Configuring hybrid identity with AD Connect
- Implementing device authentication certificates
- Trusted root and intermediate CA integration for secure connections
- Configuring device compliance as a condition for access
- Integration between Intune and Conditional Access policies
- Building Conditional Access rules for device state enforcement
- Multi-factor authentication requirements for enrolled devices
- Named locations and risk-based access policies
- Creating compliant device-only access scenarios
- Excluding break-glass accounts from strict policies
- Monitoring sign-in logs and device compliance impact
- Using Sign-in Frequency and Continuous Access Evaluation
- Preparing for zero-trust network access with device signals
Module 6: Security, Threat Protection & Compliance - Integrating Microsoft Defender for Endpoint with Intune
- Enabling threat-based conditional access using Defender data
- Automated investigation and remediation workflows
- Configuring endpoint detection and response (EDR) settings
- Managing real-time protection and scan schedules
- Antivirus policy enforcement across Windows and macOS
- Firewall configuration via Intune policy
- Disk encryption enforcement: BitLocker and FileVault
- Managing cloud-delivered protection and sample submission
- Using attack surface reduction (ASR) rules in enterprise environments
- Exploit protection settings for Office and Edge applications
- Monitoring device compliance with CIS benchmarks
- Mapping policies to regulatory standards: GDPR, HIPAA, NIST
- Generating compliance reports for audit evidence
- Using compliance score to prioritise risk reduction
- Remediation guidance for non-compliant devices
- Automated compliance policy updates via Microsoft recommendations
Module 7: Network Security & Connectivity Policies - Deploying Wi-Fi and VPN configurations via Intune
- Creating Wi-Fi profiles for enterprise WPA2-Enterprise networks
- Distributing certificate-based authentication for wireless access
- Configuring Always-On VPN for remote users
- Deploying IKEv2, L2TP, and SSTP VPN profiles
- Using per-app VPN for selective traffic tunneling
- Proxy configuration and automatic detection (PAC) deployment
- Managing DNS settings and network discovery options
- Configuring Ethernet and cellular data profiles
- Roaming and data usage controls for mobile devices
- Secure email and calendar connectivity (EAS) policies
- Integrating with third-party secure email gateways
- Managing certificate profiles for device and user authentication
- Auto-enrollment with NDES and certificate template mapping
- Revocation checking and certificate lifecycle management
Module 8: Reporting, Monitoring & Operational Excellence - Key metrics to monitor in Microsoft Endpoint Manager
- Using Device Overview dashboard for health assessment
- Interpreting device compliance and enrollment success rates
- Configuring proactive remediation with PowerShell scripts
- Setting up email alerts and action centers
- Using Log Analytics and Sentinel for advanced monitoring
- Integrating Power BI for custom reporting dashboards
- Exporting audit logs and tracking administrator activity
- Analysing policy deployment success and failure patterns
- Device inventory reporting: OS versions, disk encryption, and hardware
- Application installation success and failure reports
- Conditional Access and compliance policy impact analysis
- Detecting misconfigurations using Baseline Compliance Reports
- Troubleshooting sync issues and policy application delays
- Using Remote Help for Windows device support
- Managing device lock and passcode reset requests
- Viewing device logs and diagnostic data securely
- Incident response workflows using Intune data
Module 9: Advanced Automation & DevOps Integration - Introduction to Infrastructure as Code (IaC) for Intune
- Using Microsoft Graph API to automate policy creation
- Exporting and importing policies via Graph Explorer
- Scripting bulk operations with PowerShell and Intune PowerShell SDK
- Automating device group creation based on Azure AD attributes
- Version controlling policies using GitHub and Azure Repos
- Setting up CI/CD pipelines for policy deployment
- Using Azure Automation Runbooks for scheduled tasks
- Automated compliance drift detection and correction
- Integrating with ServiceNow for ticketing workflows
- Building self-service actions in Power Automate
- Creating approval workflows for high-risk changes
- Automating decommissioning tasks upon offboarding
- Using Logic Apps to connect Intune with other systems
- Monitoring API usage and rate limits
- Documentation automation: Generating living policy playbooks
Module 10: Co-Management & Hybrid Environment Strategy - Designing a co-management strategy with Configuration Manager
- Workload distribution: What to manage in Intune vs SCCM
- Enabling co-management on existing ConfigMgr clients
- Choosing which workloads to offload first: Driver management, policies, updates
- Deploying Windows quality and feature updates via Intune
- Managing update rings and deferral policies
- Monitoring Windows Update for Business (WUfB) performance
- Using Update Compliance in Azure Monitor for insights
- Phased deployment strategies for major OS upgrades
- Disaster recovery planning for Windows servicing
- Uninstalling ConfigMgr client post-migration
- Migrating application deployments from SCCM to Intune
- Handling legacy installer types not supported in Intune
- Managing software distribution during transition
- Communicating change to end users and helpdesk teams
Module 11: Industry-Specific Deployment Patterns - Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site
Module 12: Certification Preparation & Final Implementation Project - Mapping course content to Microsoft certification paths
- Key topics for MD-102: Endpoint Administrator Associate
- Practice scenarios for real-world troubleshooting
- Documentation standards for enterprise change requests
- Building your final implementation project
- Selecting a use case: e.g. secure remote workforce onboarding
- Designing policy sets for a target user group
- Creating conditional access rules with compliance checks
- Deploying applications and security baselines
- Setting up monitoring and alerting workflows
- Documenting your architecture and decision rationale
- Submitting for review and feedback from instructors
- Revising based on expert recommendations
- Final verification and completion checklist
- Earning your Certificate of Completion issued by The Art of Service
- Career advancement pathways: Next certifications, roles, and specialisations
- Joining the alumni network for ongoing support
- Accessing member-exclusive templates and policy libraries
- Role of Azure AD in Intune-driven device management
- Device registration vs. device enrollment workflows
- Configuring hybrid identity with AD Connect
- Implementing device authentication certificates
- Trusted root and intermediate CA integration for secure connections
- Configuring device compliance as a condition for access
- Integration between Intune and Conditional Access policies
- Building Conditional Access rules for device state enforcement
- Multi-factor authentication requirements for enrolled devices
- Named locations and risk-based access policies
- Creating compliant device-only access scenarios
- Excluding break-glass accounts from strict policies
- Monitoring sign-in logs and device compliance impact
- Using Sign-in Frequency and Continuous Access Evaluation
- Preparing for zero-trust network access with device signals
Module 6: Security, Threat Protection & Compliance - Integrating Microsoft Defender for Endpoint with Intune
- Enabling threat-based conditional access using Defender data
- Automated investigation and remediation workflows
- Configuring endpoint detection and response (EDR) settings
- Managing real-time protection and scan schedules
- Antivirus policy enforcement across Windows and macOS
- Firewall configuration via Intune policy
- Disk encryption enforcement: BitLocker and FileVault
- Managing cloud-delivered protection and sample submission
- Using attack surface reduction (ASR) rules in enterprise environments
- Exploit protection settings for Office and Edge applications
- Monitoring device compliance with CIS benchmarks
- Mapping policies to regulatory standards: GDPR, HIPAA, NIST
- Generating compliance reports for audit evidence
- Using compliance score to prioritise risk reduction
- Remediation guidance for non-compliant devices
- Automated compliance policy updates via Microsoft recommendations
Module 7: Network Security & Connectivity Policies - Deploying Wi-Fi and VPN configurations via Intune
- Creating Wi-Fi profiles for enterprise WPA2-Enterprise networks
- Distributing certificate-based authentication for wireless access
- Configuring Always-On VPN for remote users
- Deploying IKEv2, L2TP, and SSTP VPN profiles
- Using per-app VPN for selective traffic tunneling
- Proxy configuration and automatic detection (PAC) deployment
- Managing DNS settings and network discovery options
- Configuring Ethernet and cellular data profiles
- Roaming and data usage controls for mobile devices
- Secure email and calendar connectivity (EAS) policies
- Integrating with third-party secure email gateways
- Managing certificate profiles for device and user authentication
- Auto-enrollment with NDES and certificate template mapping
- Revocation checking and certificate lifecycle management
Module 8: Reporting, Monitoring & Operational Excellence - Key metrics to monitor in Microsoft Endpoint Manager
- Using Device Overview dashboard for health assessment
- Interpreting device compliance and enrollment success rates
- Configuring proactive remediation with PowerShell scripts
- Setting up email alerts and action centers
- Using Log Analytics and Sentinel for advanced monitoring
- Integrating Power BI for custom reporting dashboards
- Exporting audit logs and tracking administrator activity
- Analysing policy deployment success and failure patterns
- Device inventory reporting: OS versions, disk encryption, and hardware
- Application installation success and failure reports
- Conditional Access and compliance policy impact analysis
- Detecting misconfigurations using Baseline Compliance Reports
- Troubleshooting sync issues and policy application delays
- Using Remote Help for Windows device support
- Managing device lock and passcode reset requests
- Viewing device logs and diagnostic data securely
- Incident response workflows using Intune data
Module 9: Advanced Automation & DevOps Integration - Introduction to Infrastructure as Code (IaC) for Intune
- Using Microsoft Graph API to automate policy creation
- Exporting and importing policies via Graph Explorer
- Scripting bulk operations with PowerShell and Intune PowerShell SDK
- Automating device group creation based on Azure AD attributes
- Version controlling policies using GitHub and Azure Repos
- Setting up CI/CD pipelines for policy deployment
- Using Azure Automation Runbooks for scheduled tasks
- Automated compliance drift detection and correction
- Integrating with ServiceNow for ticketing workflows
- Building self-service actions in Power Automate
- Creating approval workflows for high-risk changes
- Automating decommissioning tasks upon offboarding
- Using Logic Apps to connect Intune with other systems
- Monitoring API usage and rate limits
- Documentation automation: Generating living policy playbooks
Module 10: Co-Management & Hybrid Environment Strategy - Designing a co-management strategy with Configuration Manager
- Workload distribution: What to manage in Intune vs SCCM
- Enabling co-management on existing ConfigMgr clients
- Choosing which workloads to offload first: Driver management, policies, updates
- Deploying Windows quality and feature updates via Intune
- Managing update rings and deferral policies
- Monitoring Windows Update for Business (WUfB) performance
- Using Update Compliance in Azure Monitor for insights
- Phased deployment strategies for major OS upgrades
- Disaster recovery planning for Windows servicing
- Uninstalling ConfigMgr client post-migration
- Migrating application deployments from SCCM to Intune
- Handling legacy installer types not supported in Intune
- Managing software distribution during transition
- Communicating change to end users and helpdesk teams
Module 11: Industry-Specific Deployment Patterns - Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site
Module 12: Certification Preparation & Final Implementation Project - Mapping course content to Microsoft certification paths
- Key topics for MD-102: Endpoint Administrator Associate
- Practice scenarios for real-world troubleshooting
- Documentation standards for enterprise change requests
- Building your final implementation project
- Selecting a use case: e.g. secure remote workforce onboarding
- Designing policy sets for a target user group
- Creating conditional access rules with compliance checks
- Deploying applications and security baselines
- Setting up monitoring and alerting workflows
- Documenting your architecture and decision rationale
- Submitting for review and feedback from instructors
- Revising based on expert recommendations
- Final verification and completion checklist
- Earning your Certificate of Completion issued by The Art of Service
- Career advancement pathways: Next certifications, roles, and specialisations
- Joining the alumni network for ongoing support
- Accessing member-exclusive templates and policy libraries
- Deploying Wi-Fi and VPN configurations via Intune
- Creating Wi-Fi profiles for enterprise WPA2-Enterprise networks
- Distributing certificate-based authentication for wireless access
- Configuring Always-On VPN for remote users
- Deploying IKEv2, L2TP, and SSTP VPN profiles
- Using per-app VPN for selective traffic tunneling
- Proxy configuration and automatic detection (PAC) deployment
- Managing DNS settings and network discovery options
- Configuring Ethernet and cellular data profiles
- Roaming and data usage controls for mobile devices
- Secure email and calendar connectivity (EAS) policies
- Integrating with third-party secure email gateways
- Managing certificate profiles for device and user authentication
- Auto-enrollment with NDES and certificate template mapping
- Revocation checking and certificate lifecycle management
Module 8: Reporting, Monitoring & Operational Excellence - Key metrics to monitor in Microsoft Endpoint Manager
- Using Device Overview dashboard for health assessment
- Interpreting device compliance and enrollment success rates
- Configuring proactive remediation with PowerShell scripts
- Setting up email alerts and action centers
- Using Log Analytics and Sentinel for advanced monitoring
- Integrating Power BI for custom reporting dashboards
- Exporting audit logs and tracking administrator activity
- Analysing policy deployment success and failure patterns
- Device inventory reporting: OS versions, disk encryption, and hardware
- Application installation success and failure reports
- Conditional Access and compliance policy impact analysis
- Detecting misconfigurations using Baseline Compliance Reports
- Troubleshooting sync issues and policy application delays
- Using Remote Help for Windows device support
- Managing device lock and passcode reset requests
- Viewing device logs and diagnostic data securely
- Incident response workflows using Intune data
Module 9: Advanced Automation & DevOps Integration - Introduction to Infrastructure as Code (IaC) for Intune
- Using Microsoft Graph API to automate policy creation
- Exporting and importing policies via Graph Explorer
- Scripting bulk operations with PowerShell and Intune PowerShell SDK
- Automating device group creation based on Azure AD attributes
- Version controlling policies using GitHub and Azure Repos
- Setting up CI/CD pipelines for policy deployment
- Using Azure Automation Runbooks for scheduled tasks
- Automated compliance drift detection and correction
- Integrating with ServiceNow for ticketing workflows
- Building self-service actions in Power Automate
- Creating approval workflows for high-risk changes
- Automating decommissioning tasks upon offboarding
- Using Logic Apps to connect Intune with other systems
- Monitoring API usage and rate limits
- Documentation automation: Generating living policy playbooks
Module 10: Co-Management & Hybrid Environment Strategy - Designing a co-management strategy with Configuration Manager
- Workload distribution: What to manage in Intune vs SCCM
- Enabling co-management on existing ConfigMgr clients
- Choosing which workloads to offload first: Driver management, policies, updates
- Deploying Windows quality and feature updates via Intune
- Managing update rings and deferral policies
- Monitoring Windows Update for Business (WUfB) performance
- Using Update Compliance in Azure Monitor for insights
- Phased deployment strategies for major OS upgrades
- Disaster recovery planning for Windows servicing
- Uninstalling ConfigMgr client post-migration
- Migrating application deployments from SCCM to Intune
- Handling legacy installer types not supported in Intune
- Managing software distribution during transition
- Communicating change to end users and helpdesk teams
Module 11: Industry-Specific Deployment Patterns - Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site
Module 12: Certification Preparation & Final Implementation Project - Mapping course content to Microsoft certification paths
- Key topics for MD-102: Endpoint Administrator Associate
- Practice scenarios for real-world troubleshooting
- Documentation standards for enterprise change requests
- Building your final implementation project
- Selecting a use case: e.g. secure remote workforce onboarding
- Designing policy sets for a target user group
- Creating conditional access rules with compliance checks
- Deploying applications and security baselines
- Setting up monitoring and alerting workflows
- Documenting your architecture and decision rationale
- Submitting for review and feedback from instructors
- Revising based on expert recommendations
- Final verification and completion checklist
- Earning your Certificate of Completion issued by The Art of Service
- Career advancement pathways: Next certifications, roles, and specialisations
- Joining the alumni network for ongoing support
- Accessing member-exclusive templates and policy libraries
- Introduction to Infrastructure as Code (IaC) for Intune
- Using Microsoft Graph API to automate policy creation
- Exporting and importing policies via Graph Explorer
- Scripting bulk operations with PowerShell and Intune PowerShell SDK
- Automating device group creation based on Azure AD attributes
- Version controlling policies using GitHub and Azure Repos
- Setting up CI/CD pipelines for policy deployment
- Using Azure Automation Runbooks for scheduled tasks
- Automated compliance drift detection and correction
- Integrating with ServiceNow for ticketing workflows
- Building self-service actions in Power Automate
- Creating approval workflows for high-risk changes
- Automating decommissioning tasks upon offboarding
- Using Logic Apps to connect Intune with other systems
- Monitoring API usage and rate limits
- Documentation automation: Generating living policy playbooks
Module 10: Co-Management & Hybrid Environment Strategy - Designing a co-management strategy with Configuration Manager
- Workload distribution: What to manage in Intune vs SCCM
- Enabling co-management on existing ConfigMgr clients
- Choosing which workloads to offload first: Driver management, policies, updates
- Deploying Windows quality and feature updates via Intune
- Managing update rings and deferral policies
- Monitoring Windows Update for Business (WUfB) performance
- Using Update Compliance in Azure Monitor for insights
- Phased deployment strategies for major OS upgrades
- Disaster recovery planning for Windows servicing
- Uninstalling ConfigMgr client post-migration
- Migrating application deployments from SCCM to Intune
- Handling legacy installer types not supported in Intune
- Managing software distribution during transition
- Communicating change to end users and helpdesk teams
Module 11: Industry-Specific Deployment Patterns - Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site
Module 12: Certification Preparation & Final Implementation Project - Mapping course content to Microsoft certification paths
- Key topics for MD-102: Endpoint Administrator Associate
- Practice scenarios for real-world troubleshooting
- Documentation standards for enterprise change requests
- Building your final implementation project
- Selecting a use case: e.g. secure remote workforce onboarding
- Designing policy sets for a target user group
- Creating conditional access rules with compliance checks
- Deploying applications and security baselines
- Setting up monitoring and alerting workflows
- Documenting your architecture and decision rationale
- Submitting for review and feedback from instructors
- Revising based on expert recommendations
- Final verification and completion checklist
- Earning your Certificate of Completion issued by The Art of Service
- Career advancement pathways: Next certifications, roles, and specialisations
- Joining the alumni network for ongoing support
- Accessing member-exclusive templates and policy libraries
- Healthcare: HIPAA-compliant device configurations
- Finance: Meeting SOX and PCI DSS requirements
- Education: Student device lifecycle and classroom management
- Government: Federal Desktop Core Configuration (FDCC) alignment
- Manufacturing: Kiosk mode and locked-down devices
- Retail: Shared device management in point-of-sale environments
- Legal sector: Data protection and confidentiality enforcement
- Remote workforce: Secure configurations for home offices
- Field services: Mobile workforce and offline operation support
- International data residency and local compliance needs
- Using administrative units for regional policy control
- Multi-language device provisioning templates
- Timezone and regional settings automation
- Supporting mixed OS environments across regions
- Global rollout planning: Phased deployment by site