Endpoint Management
Endpoint Management 5-Day Workshop
Get an executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization.
Overview
Learn how to improve your management capabilities with Microsoft Endpoint Manager:
- Discover & Protect your endpoints by enforcing policies and deploying security tools
- Secure your identities with multi-factor authentication & conditional access from any device
- Enable your users to be productive with the applications they need, on the devices they want.
Day 1-2 – Design and Planning
- Run through the Microsoft Endpoint Management solution
- Deep-dive into MDM & MAM
- OS specific management discussion
- Integrations with the suite across Microsoft 365 including Defender for Endpoint
- Build a plan for the discovery and configuration session
Get More Information
Day 3-4 – Discover, Configure and Demonstrate Value
- Light-touch discovery session on current Intune/SCCM deployment (if existing)
- Configuration of baseline policies from Day 1, targeting proof of concept groups
- On-boarding of proof of concept devices
- Deep-dive into Microsoft Endpoint Manager processes
- Document experience
Day 5 – Key Results, Findings and Recommendations
- Recap of first two days
- Presentation with Akari findings and recommendations for the environment based off discovery
- Environment and documentation handover
Proof of Concepts & Implementations
Terrific Tech provides a number of proof of concepts and implementations options to allow clients to explore the possibilities of using technology to benefit their businesses.