Microsoft Defender on your users Windows 10 devices

Assignment Help Basic Computer Science
Reference no: EM133466858

Scenario 1

Your organization has 500 employees and has implemented a bring your own device (BYOD) strategy that enables users to use their personal mobile phones and tablets for corporate purposes as long as they comply with company policy regarding security and management features. After consulting an employee survey, you find that the users in your organization have iOS, Android, or Windows 10 devices.

1. What technology should you use to manage the devices?

2. You want to simplify enrollment for your Windows device users. What should you do?

3. To support your iOS devices, what additional step is required to enable MDM?

Scenario 2

Like many large organizations, security is a big concern at Contoso. You decide to implement MDM with Intune to help to manage and secure your users' devices.

1. What feature of Intune could you use to verify the current status of Microsoft Defender on your users' Windows 10 devices?

2. You want to be able to configure Microsoft Defender Application Guard settings for enrolled Windows 10 devices. How can you achieve this in Intune?

3. You don't want users with Android devices to be able to enroll them. How could you enforce this restriction?

Scenario 3

You want to streamline the Intune enrollment process for your Windows 10 device users. When users turn on a new computer for the first time, you want the enrollment process to be automatic.

1. How could you achieve this?

2. You want to largely automate the process of enrollment, but you would like users to configure some aspects of their device settings during setup. What should you do?

Scenario 4

Adatum Corporation uses Microsoft 365 and has implemented Windows 10 Enterprise for all devices. You configure Windows Update for Business and deploy update rings using Microsoft Intune.

1. Two of the remote offices are in an area with poor internet bandwidth, and the IT team are concerned that operational requirements may be difficult to maintain. What measure could you implement for the devices located at the remote locations to reduce bandwidth consumption from Windows updates?

2. Windows updates that are being received by the head office devices are consuming too much of the available bandwidth. Users are reporting that access to the internet is slow. What are several settings that you can configure within Microsoft Intune to help relieve congestion at the head office?

3. Your compliance manager has received confirmation that Windows 10 Enterprise, version 21H1 has been approved as compliant by your regulatory body. You need to ensure that all devices use only this version of Windows, until the compliance manager confirms that a new version is compliant. How will you proceed?

4. You need to work with the compliance manager to ensure that future versions of Windows 10 Enterprise obtain regulatory compliance before the deployed version of Windows 10 becomes unsupported. What will you do to ensure that you can proactively evaluate the compatibility of new versions of Windows 10?

Reference no: EM133466858

Questions Cloud

In model of bipartite graph in computer networks : In a model of a bipartite graph in computer networks, there are 12 servers and 15 clients. Each client needs to be connected to exactly 2 servers
What benefit does a global strategy provide an organization : What benefit does a global strategy provide an organization? Describe a situation when a global strategy would not be a viable solution for an organization.
Clinical and public health settings : As a health care manager, it is important that you understand data analytic terms as they are used in clinical and public health settings
Canonical text notation representation : Be sure to convert the address to its canonical text notation representation and make sure to eliminate all leadings 0 digits as appropriate.
Microsoft Defender on your users Windows 10 devices : What feature of Intune could you use to verify the current status of Microsoft Defender on your users' Windows 10 devices?
What did you find most challenging from simulations : What did you find most challenging from the simulations? How is what you learned from the assignments applicable to the medical field?
Leukocyte accumulation within lung disease : Haemorrhage and leukocyte accumulation within lung disease is a sign of inflammation is associated with or linked to the immune response. explain?
Gram-negative and gram-positive bacteria : How do you suppose the scientists figured out that the compound in Hydra acts against both gram-negative and gram-positive bacteria?
Diagram the structure of antibody : Diagram the structure of an antibody. What type of molecule is it? What is an antigen? What are 2 common types of molecules that can be antigens?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computer programming-based on boolean logic

This week is about logic in computer programming. Ultimately, everything that a computer does is based on Boolean Logic

  Determine the mean of the sampling distribution

Determine the mean of the sampling distribution of p and the standard deviation of p. P=0.541, n=1100, and the population size is 25,000.

  Why the food network such an important venue for advertisers

Scripps Networks Interactive: An Expert at Connecting Advertisers with Programming Television advertisers have faced challenges in the past several years.

  Information governance and legal functions

Briefly discuss the three reasons why corporations must proactively manage the e-discovery process?

  Describe security infrastructure needed to establish trust

Describe the security infrastructure needed to establish "trust" when a device connects to the network.

  Effect on the exchange value of the us dollar

Did the consistent lowering of the Federal Funds Rate Target during 2007 & 2008 have an effect on the exchange value of the U.S. Dollar?

  How much data can you store on typical hard drive

How much data can you store on a typical hard drive today? How much data does a car generate?

  Design the logic for a program that has two parts

Practice: array minimum, maximum and average. Design the logic for a program that has two parts.

  Advantages of the database approach

What are the advantages of the database approach over the traditional approach to database management? What is a data center, and why are they becoming increasingly important

  Describing the terrorism attack and its aftermath

Using the Web or other resources, research an example of Cyber Terrorism. describing the terrorism attack and it's aftermath

  Working at olduvai gorge in tanzania

Ellen is an anthropologist who has been working at Olduvai Gorge in Tanzania for the past six months. She has been conducting research on the Internet.

  Define firewall security techniques

Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd