Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page31/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   27   28   29   30   31   32   33   34   ...   37
Secure Identities and Access

Endpoint Compliance (optional)




This activity is divided up into the following two parts:
Endpoint Compliance Presentation
Explain how Microsoft Endpoint Manager and Azure AD can help the customer to restrict access to applications and resources from anywhere, only from secure and compliant devices.
Work on the deployment plan for mobile device management and endpoint compliance.
Then, work together with the customer to review their current device management strategy and show how Microsoft Endpoint Manager and Azure AD can help to secure applications and resources by only allowing access from trusted and compliant devices. Help the customer start making a high-level deployment plan for a device management solution based on Microsoft Endpoint Manager and Azure AD and define the next steps.


Objectives

The objectives for the activity are to present an overview of Microsoft Endpoint Manager and managing endpoint compliance and help the customer to make a high-level deployment plan for their organization and define next steps, particularly the following:

  • Deliver the 14 - Secure Identities and Access – Endpoint Compliance.pptx presentation.

  • Update the Endpoint Compliance deployment plan slides within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Define and agree with the customer on next steps in terms of follow-up activities and/or engagements and document as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Format

Can be delivered as an onsite or online workshop.
Customer resources

  • Security Team.

  • Device Management Team
Delivery resources

  • Security Architect

  • Device Management Architect

  • Engagement Manager
Supporting materials

  • 02 – Secure Identities and Access - Customer Questionnaire.docx

  • 14 - Secure Identities and Access – Endpoint Compliance.pptx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Preparation

The delivery resource will need to familiarize themself with:

  • 02 – Secure Identities and Access - Customer Questionnaire.docx

  • 14 - Secure Identities and Access – Endpoint Compliance.pptx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Pre-requisites

The activities outlined in section 10 Engagement Setup and Reporting must be completed prior to starting this activity.
Deliverables

The deliverables of the module are defined as:

  • Updated Endpoint Compliance high-level deployment plan within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Next steps defined and agreed upon with the customer (follow-up engagements) and documented as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Guidance

Deliver the activity by presenting the 14 - Secure Identities and Access – Endpoint Compliance.pptx presentation.


1   ...   27   28   29   30   31   32   33   34   ...   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page