Endpoint Management

Endpoint Management 5-Day Workshop

Get an executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization.

Overview

Learn how to improve your management capabilities with Microsoft Endpoint Manager:

  • Discover & Protect your endpoints by enforcing policies and deploying security tools
  • Secure your identities with multi-factor authentication & conditional access from any device
  • Enable your users to be productive with the applications they need, on the devices they want.

Day 1-2 – Design and Planning

  • Run through the Microsoft Endpoint Management solution
  • Deep-dive into MDM & MAM
  • OS specific management discussion
  • Integrations with the suite across Microsoft 365 including Defender for Endpoint
  • Build a plan for the discovery and configuration session

Get More Information

Day 3-4 – Discover, Configure and Demonstrate Value

  • Light-touch discovery session on current Intune/SCCM deployment (if existing)
  • Configuration of baseline policies from Day 1, targeting proof of concept groups
  • On-boarding of proof of concept devices
  • Deep-dive into Microsoft Endpoint Manager processes
  • Document experience

Day 5 – Key Results, Findings and Recommendations

  • Recap of first two days
  • Presentation with Akari findings and recommendations for the environment based off discovery
  • Environment and documentation handover

Proof of Concepts & Implementations

Terrific Tech provides a number of proof of concepts and implementations options to allow clients to explore the possibilities of using technology to benefit their businesses.