Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft Endpoint Manager

You're reading from  Mastering Microsoft Endpoint Manager

Product type Book
Published in Oct 2021
Publisher Packt
ISBN-13 9781801078993
Pages 666 pages
Edition 1st Edition
Languages
Authors (2):
Christiaan Brinkhoff Christiaan Brinkhoff
Profile icon Christiaan Brinkhoff
Per Larsen Per Larsen
Profile icon Per Larsen
View More author details

Table of Contents (24) Chapters

Preface 1. Section 1: Understanding the Basics
2. Chapter 1: Introduction to Microsoft 365 3. Chapter 2: What Is Unified Endpoint Management? 4. Section 2: Windows 365
5. Chapter 3: Introducing Windows 365 6. Chapter 4: Deploying Windows 365 7. Section 3: Mastering Microsoft Endpoint Manager
8. Chapter 5: Requirements for Microsoft Endpoint Manager 9. Chapter 6: Windows Deployment and Management 10. Chapter 7: Manager Windows Autopilot 11. Chapter 8: Application Management and Delivery 12. Chapter 9: Understanding Policy Management 13. Chapter 10: Advanced Policy Management 14. Chapter 11: Office Policy Management 15. Chapter 12: User Profile Management 16. Chapter 13: Identity and Security Management 17. Chapter 14: Monitoring and Endpoint Analytics 18. Chapter 15: Universal Print 19. Section 4: Tips and Tricks from the Field
20. Chapter 16: Troubleshooting Microsoft Endpoint Manager 21. Chapter 17: Troubleshooting Windows 365 22. Chapter 18: Community Help 23. Other Books You May Enjoy

What is a CSP policy?

Some policies can only be configured at the device level, whereas other policies can be configured at the user level. This means that device-level policies will have an effect independent of the user logging into the device, whereas user-level policies will have an effect depending on the user logging into the device.

User scope is where the policy only applies to the user who logs into the device, and the policy can vary depending on who is logging on to the device. The following is an example of what the CSP tree looks like when configuring a user policy:

  • ./User/Vendor/MSFT/Policy/Config/AreaName/PolicyName to configure the policy
  • ./User/Vendor/MSFT/Policy/Result/AreaName/PolicyName to get the result

Device scope is where the policy only applies to the device itself, regardless of the user who logs into the device. The following is an example of what the CSP tree looks like when configuring a device policy:

  • ./Device/Vendor/MSFT...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}