Event banner
Zero Trust and the Secure Future Initiative: 2024
Event details
That concludes our Unpacking Endpoint Management for today. We’ll be back next month!
In addition to the questions posted on this page, we also answer questions posted in reply to the event on LinkedIn and X (Twitter). Here are the questions we answered today:
From X -- What is the best way to enforce policy and compliance on multitenant devices like those used by contractors with BYOD? - answered at 14:10
Question -- If Identity is now the ultimate barrier, should I continue to configure complex Windows firewall rules? If not, what should I be doing instead? - answered at 27:42
From X -- At what point can we get rid of VPNs completely? - answered at 34:10
Question -- So, if we apply “just because you can migrate every policy – doesn’t mean you should” to Group Policy.... should we follow that same philosophy with the firewall migration tool for Intune? - answered at 40:10
From Dylan on LinkedIn -- Can you elaborate a bit about how the hybrid join process works for laptops deployed using autopilot when the end user may not have LoS to a DC? - answered at 48:40