Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft Endpoint Manager

You're reading from  Mastering Microsoft Endpoint Manager

Product type Book
Published in Oct 2021
Publisher Packt
ISBN-13 9781801078993
Pages 666 pages
Edition 1st Edition
Languages
Authors (2):
Christiaan Brinkhoff Christiaan Brinkhoff
Profile icon Christiaan Brinkhoff
Per Larsen Per Larsen
Profile icon Per Larsen
View More author details

Table of Contents (24) Chapters

Preface 1. Section 1: Understanding the Basics
2. Chapter 1: Introduction to Microsoft 365 3. Chapter 2: What Is Unified Endpoint Management? 4. Section 2: Windows 365
5. Chapter 3: Introducing Windows 365 6. Chapter 4: Deploying Windows 365 7. Section 3: Mastering Microsoft Endpoint Manager
8. Chapter 5: Requirements for Microsoft Endpoint Manager 9. Chapter 6: Windows Deployment and Management 10. Chapter 7: Manager Windows Autopilot 11. Chapter 8: Application Management and Delivery 12. Chapter 9: Understanding Policy Management 13. Chapter 10: Advanced Policy Management 14. Chapter 11: Office Policy Management 15. Chapter 12: User Profile Management 16. Chapter 13: Identity and Security Management 17. Chapter 14: Monitoring and Endpoint Analytics 18. Chapter 15: Universal Print 19. Section 4: Tips and Tricks from the Field
20. Chapter 16: Troubleshooting Microsoft Endpoint Manager 21. Chapter 17: Troubleshooting Windows 365 22. Chapter 18: Community Help 23. Other Books You May Enjoy

Cloud apps

Cloud apps are AAD Enterprise applications that represent the Microsoft cloud or third-party applications. This could be, for example, Windows 365, a Software as a Service (SaaS) application, or Office 365 services.

To enforce different Conditional Access settings per cloud app(s), you can create different policies that only apply to that specific application to customize access:

Figure 13.17 – Selecting cloud apps

Cloud apps most likely are named after the service; otherwise, you have to select them according to the right app ID, such as 0af06dc6-e4b5-4f28-818e-e78e62d137a5.

Aside from filtering on cloud apps, you could also apply Conditional Access settings during actions, for example, the process of registering and joining devices to MEM. You must then select user actions instead of cloud apps:

  • Register security information
  • Register or join devices

Figure 13.18 – User actions

Next...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}