Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft Intune - Second Edition

You're reading from  Mastering Microsoft Intune - Second Edition

Product type Book
Published in Mar 2024
Publisher Packt
ISBN-13 9781835468517
Pages 822 pages
Edition 2nd Edition
Languages
Authors (2):
Christiaan Brinkhoff Christiaan Brinkhoff
Profile icon Christiaan Brinkhoff
Per Larsen Per Larsen
Profile icon Per Larsen
View More author details

Table of Contents (25) Chapters

Preface 1. Understanding the Basics
2. Introduction to Microsoft 365 3. Cloud-Native Endpoints 4. Requirements for Microsoft Intune 5. Windows 365
6. What Is Windows 365? 7. Deploying Windows 365 8. Mastering Microsoft Intune
9. Windows Deployment and Management 10. Windows Autopilot 11. Application Management and Delivery 12. Understanding Policy Management 13. Advanced Policy Management 14. Intune Suite 15. Copilot/AI 16. Identity and Security Management 17. Monitoring and Endpoint Analytics 18. Universal Print 19. Troubleshooting and Community
20. Troubleshooting Microsoft Intune
21. Troubleshooting Windows 365
22. Community Help 23. Other Books You May Enjoy
24. Index

Configure device configuration (template)

Templates contain groups of settings, organized by functionality. You should use a template when you don’t want to build policies manually or want to configure devices to access corporate networks, such as configuring Wi-Fi or VPN.

We will show some examples, along with use cases, in this section.

The first example is Device Firmware Configuration Interface. Here, it is recommended that if you have devices that support Device Firmware Configuration Interface (DFCI), bear in mind that it requires that the device is registered through the Autopilot service from the CSP or OEM process. Read more about that in Chapter 7. DFCI enables Windows to pass management commands from Intune to Unified Extensible Firmware Interface (UEFI). In Intune, use this feature to control BIOS settings. Typically, firmware is more resilient to malicious attacks. It limits end users’ control over the BIOS, which is good in a compromised situation...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}