Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft Intune - Second Edition

You're reading from  Mastering Microsoft Intune - Second Edition

Product type Book
Published in Mar 2024
Publisher Packt
ISBN-13 9781835468517
Pages 822 pages
Edition 2nd Edition
Languages
Authors (2):
Christiaan Brinkhoff Christiaan Brinkhoff
Profile icon Christiaan Brinkhoff
Per Larsen Per Larsen
Profile icon Per Larsen
View More author details

Table of Contents (25) Chapters

Preface 1. Understanding the Basics
2. Introduction to Microsoft 365 3. Cloud-Native Endpoints 4. Requirements for Microsoft Intune 5. Windows 365
6. What Is Windows 365? 7. Deploying Windows 365 8. Mastering Microsoft Intune
9. Windows Deployment and Management 10. Windows Autopilot 11. Application Management and Delivery 12. Understanding Policy Management 13. Advanced Policy Management 14. Intune Suite 15. Copilot/AI 16. Identity and Security Management 17. Monitoring and Endpoint Analytics 18. Universal Print 19. Troubleshooting and Community
20. Troubleshooting Microsoft Intune
21. Troubleshooting Windows 365
22. Community Help 23. Other Books You May Enjoy
24. Index

What is zero trust?

In the past, when organizations created remote access to corporate networks, normally, access was enabled using a VPN connection either on a corporate-owned or a personally owned Windows device, only secured by an MFA token.

In today’s world, organizations need a security model that can adapt to the complexities of the modern environment, accommodate a mobile workforce, and protect people, devices, applications, and data wherever they are located. This is the essence of zero trust. Instead of assuming that everything behind the corporate firewall is safe, the zero trust model operates on the assumption of a breach and verifies each request as if it originated from an uncontrolled network. No matter where the request comes from or what resource it is trying to access, the zero trust model teaches us to “never trust, always verify.”

Verifying identity

The majority of security breaches today involve credential theft, and lapses in...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}