Event banner
Tech Community Live: AMA – Manage endpoint security in Microsoft Endpoint Manager
Event details
Join us for a special Ask Microsoft Anything (AMA) live stream on endpoint security and configuration! The Microsoft Endpoint Security team is here to answer questions about the latest features and capabilities available to enable endpoint security for your hybrid workforce.
This is a great opportunity to learn from Microsoft experts and your peers.
We hope you enjoyed this edition of Tech Community Live! Please take our short survey and let us know what you thought! |
65 Comments
- Sohel68Copper ContributorWould you recommend using "wipe" on lost or stole devices? I'm curious how effective this feature & does it really work?
- Steven-HBrass ContributorIn my experience, it's unreliable. Devices may wipe but leave behind data. Devices may "wipe", the wipe fails, and the only thing that happened is that the device is kicked out of MEM but it boots up as if nothing happened.
- Heather_Poulsen
Community Manager
Thanks for joining Tech Community Live: Endpoint Manager edition and the Endpoint Security AMA. Keep posting your questions in the Comments. We will be answering questions in the live stream—and others will be answering here in the chat.
- will nimmoBrass ContributorHeather - it looks like my question on Autopatch was skipped over. Is that outside the scope of this AMA?
- Mike808Iron ContributorWhy did you put so many settings into one security baseline instead of creating different baselines (theme based) such as RDS Baseline, Defender Baseline, Above Lock Baseline, Audit Baseline... This way you would be much more flexible if there are exceptions for some systems. With only one baseline and multiple exceptions (which exist in the real world) it becomes very hard to manage baselines and prevent conflicts.
- rakeshvallakotiCopper ContributorCan you give us some information on the Windows Hello For Business using Cloud Trust and what to expect more on this as its now in preview.
- GianlucaSBBrass Contributor
- First question: When do you set just one place where to configure Endpoint Security Settings? Currently we have Security Baseline, Endpoint Security section and configuration Profiles.
- Second question: What are the concrete advantages, really in practice, to use Microsoft Defender for Endpoint compared to just use and configure Windows Defender Antivirus and Firewall? Currently in my company we are using some AD Hybrid-Joined devices with third party Antivirus and Internet Security suite (AVAST) but we are trying to figure out if we could move and only use Microsoft Defender Antivirus, firewall and all that those bring in. Thanks
(Numbered/formatted for easy reference by your friendly neighborhood Community Manager.)
- ThomasVrhydnBrass ContributorDeepdive technical information about whats happening in the background during the MDE security configuration management onboarding process. So we know how to troubleshoot the onboarding process. Are their logs files stored? Reg keys? Event viewer?
- roger_jrCopper ContributorWill Microsoft Endpoint Manager Support Red Hat Enterprise Linux and MACOS in the future ?
- Phil_M905
Microsoft
Can you talk about the differences between our security baselines? The SCT vs the baseline in Intune. I get a lot of customers asking me why we have two different ones and how do they justify to security why one or the other. E.G. Some customers download the SCT, and then import the GPOs into Intune. - will nimmoBrass ContributorHas an announcement been made about a replacement for UserVoice? If not, how do we see what priorities the ConfigMgr team has? I have items I'd like to "vote" on 🙂
- Joe_Lurie
Microsoft
You can go to https://aka.ms/IntuneFeedback. This is the UserVoice replacement.- will nimmoBrass ContributorWould that be an appropriate place to submit a request for RBAC on ConfigMgr ADRs?
- sneharay5
Microsoft
When creating an Application Control policy via the Endpoint Security node, there is no way to add specific application exceptions. If there any capabilities which will be added to the Application Control policy? Otherwise what options customer has, if they want to control which applications should be running on devices.