CMIT 420 Project 2 Template
Objective
Prototype how to use Intune to deploy and manage Windows 10 Endpoint Security and policies.
Part 1: Configure Policies in Microsoft Intune
Create the following policies for the Windows 10 virtual machine that you enrolled in Intune during project 1.
Device Configuration Profile
Conditional Access Policy
Device Compliance Policy
[Follow the instructions in the Proof-of-Concept Step-by-Step Instruction and insert your screenshots here.] The screenshots must be your own. Screenshots from external sources are not permitted.
Screenshot 1: Screenshot of the Noncompliant devices in your Intune tenant. Screenshot must contain Tenant name.
Screenshot 2: Screenshot of the “You cannot access this right now”. Screenshot must contain the time and date from the task bar of the Windows 10 device.
Screenshot 3: Screenshot of the Settings window. Screenshot must contain the time and date from the task bar of the Windows 10 device.
Part 2: Demonstrate how to configure endpoint security in Microsoft Intune.
[Follow the instructions in the Proof-of-Concept Step-by-Step Instruction and insert your screenshots here.] The screenshots must be your own. Screenshots from external sources are not permitted.
Screenshot 1: Screenshot Windows 10 Update Ring Policy Overview. Screenshot must contain the name of your Tenant in the upper right corner of the Intune dashboard.
Screenshot 2: Properties if Windows 10 Update Ring Policy. Screenshot must contain the name of your Tenant in the upper right corner of the Intune dashboard.
Screenshot 3: Screenshot of the Real-time protection and Cloud-delivered protection portion of the window. Both settings should state that the setting is managed by your administrator. Screenshot must contain the time and date from the taskbar of your Windows 10 virtual machine.
Screenshot 4: Screenshot of the Exclusions screen of Virus and Threat Protection. Screenshot must contain the time and date from the taskbar of your Windows 10 virtual machine.
Screenshot 5: Screenshot the Firewall summary. Screenshot must contain the time and date from the taskbar of your Windows 10 virtual machine.
Screenshot 6: Screenshot of Domain, Private and Public networks status on the Windows 10 virtual machine. Screenshot must contain the time and date from the taskbar of your Windows 10 virtual machine.
Part 3: Reflection Opportunity
Security administrators focus on the regular updates on Windows to defend their systems from zero-day threats. Since each policy can support more than a single profile, configuration to varying platforms allows for a broader policy area to be addressed. Since out-of-band (OOB) patches are often released at times that deviate from the regular times, Microsoft regularly convinces admins to identify and allow OOB patches since they identify vulnerable systems to attacks [1]. In this regard, admins should validate patches. At the same time, MSPs should be instituted to scan networks continually. Continuous scans facilitate the detection of attacks to targeted infrastructures. Admins should always recognize that patches also create problems such as system crashes. Therefore, they must first review respective security updates. Microsoft provides an overview of their updates in their security updates guide section.
Recent research confirms that exploitations are prevalent, hence the need to manage and deploy out-of-band patches from Microsoft envisioned enhancing security in light of zero-day threats. As such, admins are encouraged to install all security updates followed by the installation of CU/RU [1]. Following this installation, checking for newer security updates is crucial to ensure that the exchange runs concurrently with prevailing updates. In the instance that challenges prevent patching, admins are encouraged to run IIS Re-Write Rule and UM. While this is a temporary solution, it is crucial to ensure that servers get fully patched. Microsoft institutes their one-click migration service, which aims to assist admins in implementing exchange security patches. As such, admins are also challenged into sustainable patch management strategies [1]. These strategies feature testing phases like pilot groups that facilitate troubleshooting before implementing patches in their functional infrastructures.
References
[1] A. C. Nair, “Zero day out of band Patch Deployment Using Intune Mem expedite best option,” HTMD Blog #2, 12-Jul-2021. [Online]. Available: https://howtomanagedevices.com/intune/6763/out-of-band-patch-intune-deploy. [Accessed: 29-Nov-2021].
https://www.ucertify.com/?func=video&type=ebook
How To Set Up Windows Autopilot in Microsoft Intune – YouTube
References
These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as appropriate.
The post CMIT 420 Project 2 Template Objective Prototype how to use Intune to appeared first on PapersSpot.