This activity is divided up into the following two parts:
Endpoint Compliance Presentation
Explain how Microsoft Endpoint Manager and Azure AD can help the customer to restrict access to applications and resources from anywhere, only from secure and compliant devices.
Work on the deployment plan for mobile device management and endpoint compliance.
Then, work together with the customer to review their current device management strategy and show how Microsoft Endpoint Manager and Azure AD can help to secure applications and resources by only allowing access from trusted and compliant devices. Help the customer start making a high-level deployment plan for a device management solution based on Microsoft Endpoint Manager and Azure AD and define the next steps.
Objectives
The objectives for the activity are to present an overview of Microsoft Endpoint Manager and managing endpoint compliance and help the customer to make a high-level deployment plan for their organization and define next steps, particularly the following:
Deliver the 14 - Secure Identities and Access – Endpoint Compliance.pptx presentation.
Define and agree with the customer on next steps in terms of follow-up activities and/or engagements and document as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
02 – Secure Identities and Access - Customer Questionnaire.docx
14 - Secure Identities and Access – Endpoint Compliance.pptx
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Preparation
The delivery resource will need to familiarize themself with:
02 – Secure Identities and Access - Customer Questionnaire.docx
14 - Secure Identities and Access – Endpoint Compliance.pptx
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Pre-requisites
The activities outlined in section 10 Engagement Setup and Reporting must be completed prior to starting this activity.
Deliverables
The deliverables of the module are defined as:
Updated Endpoint Compliance high-level deployment plan within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Next steps defined and agreed upon with the customer (follow-up engagements) and documented as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Guidance
Deliver the activity by presenting the 14 - Secure Identities and Access – Endpoint Compliance.pptx presentation.