A framework for Windows endpoint management transformation

Published Jun 17 2021 02:08 PM 22.3K Views

Investments in Azure and Microsoft 365 can streamline your transition to the cloud and make it easier to manage endpoints across your organization. Now let's explore ways to develop and implement effective strategy to make that transition and help you create the “how” and “why” to leverage these solutions in your own environment.

endpoint-management-north-star.PNG

Update

Updating means staying ahead of adversaries and competition with technology innovations to drive security and business results through:

  • Better managing the risk of change in a fast-moving technology world with deployment rings keeping Windows up to date with the latest quality updates, feature updates, and security features managed by solutions like expedited updates and Windows Update for Business.
  • Optimizing and de-duplicating bandwidth without sacrificing control to quickly deploy critical changes to improve security and productivity using Delivery Optimization.
  • Reshaping processes to avoid determinism, embrace statistics, and becoming quality driven via Update Compliance or Desktop Analytics.
  • Redefining how your organization manages technology to invest in on-going servicing capabilities not products, and driving the use of processes and not projects.

Extend

Extending means driving real cloud value while still benefiting from your existing investments using Microsoft 365 to:

Standardize

Standardization involves increasing security and manageability while reducing operational costs by sticking with well-known and proven solutions:

Revitalize

To revitalize means building long-term user satisfaction by standardizing on reliable applications and a dependable, more focused operating system. This involves:

  • Deploying a cloud config to users that only need one or two apps in addition to their productivity apps.
  • Eliminating constant repackaging with vendor-provided packages and durable customization packages for a better application lifecycle management strategy.
  • Separating applications from the operating system and from each other as a security or reliability boundary using App and Guard Containers such as Windows Defender Application Control (WDAC) and MSIX.
  • Managing application catalogs like a portal, with tools such as Endpoint Manager’s Software Center & Company Portal to manage security and user experience while directly integrating with distribution platforms with application portfolio management.
  • Quickly recovering from reliability or security issues by building capability to rapidly reset and recover with technologies such as device reset.

Secure

Securing endpoints from the cloud involves providing the right balance of security and convenience, reducing attack surfaces, and increasing monitorability by:

Simplify

Ironically, implementing a zero-trust approach simplifies user interactions in a world where identity is the new perimeter by using a single powerful Windows identity across apps and endpoints. We recommend:

Wrapping up

As you can see, the “north star” for endpoint management transformation involves a holistic end-to-end solution set that simplifies operations, optimizes user experiences, and increases security using the best of suite culminating in a modern, cloud-managed Windows endpoint. Microsoft 365 provides this holistic solution across the entire framework. We hope these principles help you develop the proper framework for your organization.

Have feedback or a best practice to share? Drop a comment below!

 

2 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-2551038%22%20slang%3D%22en-US%22%3ERe%3A%20A%20framework%20for%20Windows%20endpoint%20management%20transformation%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2551038%22%20slang%3D%22en-US%22%3E%3CP%3ECongratulations%20Steve%2C%20this%20is%20an%20excellent%20framework%20and%20one%20that%20I%20will%20share%20with%20my%20customers.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2712566%22%20slang%3D%22en-US%22%3ERe%3A%20A%20framework%20for%20Windows%20endpoint%20management%20transformation%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2712566%22%20slang%3D%22en-US%22%3E%3CP%3EI%20would%20also%20encourage%20leveraging%20this%20new%20document%20as%20follow-up%20for%20deeper%2C%20granular%20prescriptive%20guidance%20on%20our%20documentation%20site%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fcloud-native-windows-endpoints%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGet%20started%20with%20cloud%20native%20Windows%20endpoints%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2460684%22%20slang%3D%22en-US%22%3EA%20framework%20for%20Windows%20endpoint%20management%20transformation%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2460684%22%20slang%3D%22en-US%22%3E%3CP%3EInvestments%20in%20Azure%20and%20Microsoft%20365%20can%20streamline%20your%20transition%20to%20the%20cloud%20and%20make%20it%20easier%20to%20manage%20endpoints%20across%20your%20organization.%20Now%20let's%20explore%20ways%20to%20develop%20and%20implement%20effective%20strategy%20to%20make%20that%20transition%20and%20help%20you%20create%20the%20%E2%80%9Chow%E2%80%9D%20and%20%E2%80%9Cwhy%E2%80%9D%20to%20leverage%20these%20solutions%20in%20your%20own%20environment.%3C%2FP%3E%3CP%3E%3C%2FP%3EUpdate%3CP%3EUpdating%20means%20staying%20ahead%20of%20adversaries%20and%20competition%20with%20technology%20innovations%20to%20drive%20security%20and%20business%20results%20through%3A%3C%2FP%3EBetter%20managing%20the%20risk%20of%20change%20in%20a%20fast-moving%20technology%20world%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fdeployment%2Fupdate%2Fwaas-deployment-rings-windows-10-updates%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Edeployment%20rings%3C%2FA%3E%20keeping%20Windows%20up%20to%20date%20with%20the%20latest%20quality%20updates%2C%20feature%20updates%2C%20and%20security%20features%20managed%20by%20solutions%20like%20expedited%20updates%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fdeployment%2Fupdate%2Fwaas-configure-wufb%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EWindows%20Update%20for%20Business.%3C%2FA%3E%20Optimizing%20and%20de-duplicating%20bandwidth%20without%20sacrificing%20control%20to%20quickly%20deploy%20critical%20changes%20to%20improve%20security%20and%20productivity%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fdeployment%2Fupdate%2Fwaas-delivery-optimization%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EDelivery%20Optimization%3C%2FA%3E.%20Reshaping%20processes%20to%20avoid%20determinism%2C%20embrace%20statistics%2C%20and%20becoming%20quality%20driven%20via%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fprotect%2Fwindows-update-compliance-reports%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EUpdate%20Compliance%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Fdesktop-analytics%2Foverview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EDesktop%20Analytics.%3C%2FA%3E%20Redefining%20how%20your%20organization%20manages%20technology%20to%20invest%20in%20on-going%20servicing%20capabilities%20not%20products%2C%20and%20driving%20the%20use%20of%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fwindows-it-pro-blog%2Fmoving-from-project-to-process-digital-transformation-with%2Fba-p%2F175688%22%20target%3D%22_blank%22%3Eprocesses%20and%20not%20projects.%3C%2FA%3E%20Extend%3CP%3EExtending%20means%20driving%20real%20cloud%20value%20while%20still%20benefiting%20from%20your%20existing%20investments%20using%20Microsoft%20365%20to%3A%3C%2FP%3EStop%20migrating%20user%20data%20and%20state%2C%20or%20losing%20user%20data%20trapped%20on%20an%20endpoint%2C%20and%20instead%20use%20the%20endpoints%20as%20a%20local%20cache%20for%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fonedrive%2Fplan-onedrive-enterprise%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EOneDrive%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fonedrive%2Fredirect-known-folders%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EKnown%20Folder%20Redirection%3C%2FA%3E%20with%20OneDrive%2C%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fonedrive%2Fredirect-known-folders%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EState%20Roaming%20technologies.%3C%2FA%3E%20Even%20when%20using%20your%20personal%20managed%20devices%20to%20access%20data%2C%20OneDrive%20allows%20for%20changes%20to%20follow%20you%20to%20your%20primary%20Windows%20device.%20Increase%20management%20reach%20while%20reducing%20infrastructure%20architecture%2C%20deployment%2C%20and%20operations%20cost%20in%20with%20cloud-based%20and%20cloud-attached%20management%20tools%20such%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fendpoint-manager-overview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Endpoint%20Manager%3C%2FA%3E%2C%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Fdesktop-analytics%2Foverview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Endpoint%20Configuration%20Manager%3C%2FA%3E%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Ftenant-attach%2F%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ETenant%20Attach%3C%2FA%3E%20and%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Fcore%2Fclients%2Fmanage%2Fcmg%2Foverview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ECloud%20Management%20Gateway.%3C%2FA%3E%20Deploy%20trusted%2C%20signed%20apps%20and%20minimize%20complex%20infrastructure%20using%20Modern%20Software%20Distribution%20%26amp%3B%20Package%20Manager%20technologies%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fmsix%2Foverview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMSIX%3C%2FA%3E%20and%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fpackage-manager%2F%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EWindows%20Package%20Manager%3C%2FA%3E%20(Winget.)%20Manage%20and%20monitor%20your%20application%20portfolio%2C%20software%2C%20and%20endpoint%20health%20in%20a%20perimeter-free%20world%20using%20modern%20insights%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fanalytics%2Foverview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EEndpoint%20Analytics%3C%2FA%3E.%20Standardize%3CP%3EStandardization%20involves%20increasing%20security%20and%20manageability%20while%20reducing%20operational%20costs%20by%20sticking%20with%20well-known%20and%20proven%20solutions%3A%3C%2FP%3EImplementing%20a%20well-known%20and%20proven%20secure%20configuration%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-security-baselines%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ESecurity%20Baselines.%3C%2FA%3E%20Eliminating%20expensive%20image%20engineering%20to%20accelerate%20Autopilot%20adoption%20and%20endpoint%20deployment%20using%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fautopilot%2Fregistration-overview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3E%20Windows%20Autopilot%20enterprise-ready%20signature%20images.%3C%2FA%3E%20Simplifying%20endpoint%20deployment%20and%20eliminate%20depots%20and%20build%20rooms%20by%20automatically%20applying%20policy%20and%20apps%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Ffundamentals%2Fguided-scenarios-overview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Eguided%20scenarios%3C%2FA%3E%20and%20solutions%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Ffundamentals%2Fcloud-configuration%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ECloud%20config.%3C%2FA%3E%20Reducing%20GPO%20complexity%20and%20instead%2C%20focusing%20on%20user%20outcomes%20using%20a%20centralized-based%20cloud%20policy%20solution%20like%20the%20Microsoft%20Endpoint%20Manager%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fconfiguration%2Fsettings-catalog%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ESettings%20Catalog.%3C%2FA%3E%20Revitalize%3CP%3ETo%20revitalize%20means%20building%20long-term%20user%20satisfaction%20by%20standardizing%20on%20reliable%20applications%20and%20a%20dependable%2C%20more%20focused%20operating%20system.%20This%20involves%3A%3C%2FP%3EDeploying%20a%20cloud%20config%20to%20users%20that%20only%20need%20one%20or%20two%20apps%20in%20addition%20to%20their%20productivity%20apps.%20Eliminating%20constant%20repackaging%20with%20vendor-provided%20packages%20and%20durable%20customization%20packages%20for%20a%20better%20application%20lifecycle%20management%20strategy.%20Separating%20applications%20from%20the%20operating%20system%20and%20from%20each%20other%20as%20a%20security%20or%20reliability%20boundary%20using%20App%20and%20Guard%20Containers%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-application-control%2Fwindows-defender-application-control%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EWindows%20Defender%20Application%20Control%3C%2FA%3E%20(WDAC)%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fmsix%2Fpackaging-tool%2Fcreate-app-package%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMSIX%3C%2FA%3E.%20Managing%20application%20catalogs%20like%20a%20portal%2C%20with%20tools%20such%20as%20Endpoint%20Manager%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Fapps%2Fplan-design%2Fplan-for-software-center%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ESoftware%20Center%3C%2FA%3E%20%26amp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fcompany-portal-app%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ECompany%20Portal%3C%2FA%3E%20to%20manage%20security%20and%20user%20experience%20while%20directly%20integrating%20with%20distribution%20platforms%20with%20application%20portfolio%20management.%20Quickly%20recovering%20from%20reliability%20or%20security%20issues%20by%20building%20capability%20to%20rapidly%20reset%20and%20recover%20with%20technologies%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fautopilot%2Fwindows-autopilot-reset%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Edevice%20reset.%3C%2FA%3E%20Secure%3CP%3ESecuring%20endpoints%20from%20the%20cloud%20involves%20providing%20the%20right%20balance%20of%20security%20and%20convenience%2C%20reducing%20attack%20surfaces%2C%20and%20increasing%20monitorability%20by%3A%3C%2FP%3ELeveraging%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-application-control%2Fuse-windows-defender-application-control-with-intelligent-security-graph%23%3A~%3Atext%3DThe%2520Microsoft%2520Intelligent%2520Security%2520Graph%2520option%2520helps%2520IT%2Cthe%2520execution%2520of%2520unknown%2520and%2520known%2520bad%2520software.%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Intelligent%20Security%20Graph%3C%2FA%3E%20to%20detect%20malicious%20activities%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Foverview-endpoint-detection-response%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EEndpoint%20Detection%20and%20Response%3C%2FA%3E.%20Increasing%20the%20effectiveness%20of%20security%20controls%20by%20removing%20local%20administrative%20rights%20and%20running%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fuser-account-control%2Fhow-user-account-control-works%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Estandard%20users%3C%2FA%3E.%20Validating%20and%20deploying%20key%20security%20controls%20to%20enhance%20protection%20and%20detection%20on%20endpoints%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Foverview-of-threat-mitigations-in-windows-10%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EAdvanced%20Security%20Features%3C%2FA%3E%20in%20Windows%2010%20to%20provide%20threat%20mitigations.%20Providing%20secure%20and%20compatible%20access%20to%20web%20apps%20new%20and%20old%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdeployedge%2Fmicrosoft-edge-video-security-application-guard%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EWeb%20Isolation%3C%2FA%3E%20with%20App%20Guard%20and%20managed%20compatibility%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdeployedge%2Fedge-ie-mode%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EIE%20Mode%20for%20Edge.%3C%2FA%3E%20Simplify%3CP%3EIronically%2C%20implementing%20a%20zero-trust%20approach%20simplifies%20user%20interactions%20in%20a%20world%20where%20identity%20is%20the%20new%20perimeter%20by%20using%20a%20single%20powerful%20Windows%20identity%20across%20apps%20and%20endpoints.%20We%20recommend%3A%3C%2FP%3EEliminating%20password%20prompts%20and%20complex%20SSO%20solutions%20with%20Centralized%20Identity%20and%20Access%20Management%20via%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fazureadjoin-plan%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EAzure%20Active%20Directory%3C%2FA%3E.%20Going%20password-less%20with%20solutions%20like%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-overview%23%3A~%3Atext%3DWindows%2520Hello%2520for%2520Business%252C%2520which%2520is%2520configured%2520by%2Cidentity%2520theft%2520and%2520large-scale%2520hacking%2520are%2520frequent%2520headlines.%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EWindows%20Hello%20for%20Business.%3C%2FA%3E%20Better%20protecting%20your%20sensitive%20information%20inside%20and%20outside%20the%20corporate%20firewall%20and%20suggest%20user%20behavior%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Finformation-protection%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Eintelligent%20Information%20Protection%3C%2FA%3E%20and%20data%20loss%20prevention%20software%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fendpoint-dlp-getting-started%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EEndpoint%20DLP.%3C%2FA%3E%20Creating%20intelligence-driven%20access%20policies%20for%20critical%20apps%20and%20systems%20using%20signals%20from%20identity%2C%20endpoints%2C%20and%20more%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Foverview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EAzure%20Active%20Directory%20Conditional%20Access.%3C%2FA%3E%20Managing%20printers%20through%20cloud%20services%20and%20empower%20follow-user%20printing%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Funiversal-print%2Ffundamentals%2Funiversal-print-whatis%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EUniversal%20Print%3C%2FA%3E%20and%20reduce%20on-premises%20print%20server%20dependencies.%20Wrapping%20up%3CP%3EAs%20you%20can%20see%2C%20the%20%E2%80%9Cnorth%20star%E2%80%9D%20for%20endpoint%20management%20transformation%20involves%20a%20holistic%20end-to-end%20solution%20set%20that%20simplifies%20operations%2C%20optimizes%20user%20experiences%2C%20and%20increases%20security%20using%20the%20best%20of%20suite%20culminating%20in%20a%20modern%2C%20cloud-managed%20Windows%20endpoint.%20Microsoft%20365%20provides%20this%20holistic%20solution%20across%20the%20entire%20framework.%20We%20hope%20these%20principles%20help%20you%20develop%20the%20proper%20framework%20for%20your%20organization.%3C%2FP%3E%3CP%3EHave%20feedback%20or%20a%20best%20practice%20to%20share%3F%20Drop%20a%20comment%20below!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2460684%22%20slang%3D%22en-US%22%3E%3CP%3EWant%20to%20develop%20an%20effective%20strategy%20to%20move%20endpoint%20management%20to%20the%20cloud%3F%20Check%20out%20these%20tips.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2460684%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EDeployment%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EServicing%20and%20updates%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ETips%20and%20Tricks%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jun 17 2021 02:15 PM