Event banner
Building a tamper-resilient endpoint with Microsoft Intune and Microsoft Defender
Event Ended
Wednesday, Oct 26, 2022, 09:30 AM PDTEvent details
Come listen to Matt and Josh talk about how secure endpoint configurations fit into your zero trust strategy. They'll describe the overall landscape, how to unify your configurations into a single so...
Heather_Poulsen
Updated Dec 27, 2024
Blessing
Oct 26, 2022Copper Contributor
Is it recommended or best practice for security team to edit or update configurations in MEM or they should request the IT team to make required changes?
Matt_Call
Microsoft
Oct 26, 2022You can do it either way. We offer a built-in role and a tailored experience (Endpoint Security) to allow your Security Admins to manage settings, etc. Generally, this is going to come down to your organizational culture and workload assignment, and we strive to support both scenarios.
- Paul_WoodwardOct 27, 2022Iron ContributorIn my experience, as the Intune guy, the security team will be tempted enable policy (e.g. a new security baseline) that clashes with existing policy configurations, due to lack of insight to the existing policies, and not being party to the testing of devices and policy during UAT. So any change to settings needs to be done in parallel with the ICT admins and the Service desk, so that potential clashes and breakages can be avoided, and impact assessed. I'd recommend a sign off process to ensure all parties are fully aware of changes.