https://store-images.s-microsoft.com/image/apps.27380.395cff64-26d0-4fee-9c04-242bd3b28398.35560320-05eb-494c-b862-0827909f942d.5ce27590-da94-4423-966d-650a4c542a80

Centric Endpoint Management with Security Workshop

Centric Consulting, LLC

Helping organizations modernize their endpoint management and security capabilities using Microsoft 365

Endpoint Management with Security Workshop

The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.

This four-day workshop offers an in-depth look at managing and securing devices, identities, and data. Using tools like Microsoft Intune, Entra ID, Defender for Endpoint, Autopilot, and Endpoint Analytics, participants gain insights into the client’s IT environment and learn best practices for enterprise-level endpoint security. Join our workshop to enhance your experience.

Three-Phase Engagement

  • Assess: We will collect information on the existing endpoint management and security framework, define the scope, identify stakeholders, and present the Endpoint Management with Security overview.
  • Art of the Possible: We will secure identities and devices and simplify IT management with Intune.
  • Build the Plan: We will develop deployment plans tailored to the organization’s needs based on key results and recommendations from previous phases.

Workshop Agenda Includes:

Microsoft Entra ID Overview Presentation

  • Present how Microsoft Entra ID helps to secure adaptive access.
  • Discuss how it provides seamless user experiences.
  • Explain how it secures access to all your applications.
  • Demonstrate how it automates identity governance.

Microsoft Intune Overview Presentation

  • Explore cloud-based unified endpoint management.
  • Highlight cross-platform endpoint management capabilities.
  • Discuss mobile application management and endpoint analytics.
  • Showcase specialty and shared devices management for frontline workers.

Microsoft Defender for Endpoint Presentation

  • Provide visibility and cyberthreat protection.
  • Explain endpoint detection and response (EDR) capabilities.
  • Discuss protection across Windows, macOS, Linux, Android, iOS, and IoT devices.

Windows Autopilot Presentation

  • Demonstrate zero-touch deployment for devices.
  • Discuss flexible configuration and deployment options.
  • Highlight how it simplifies device provisioning and management.

Endpoint Analytics Presentation

  • Show how to gain insights into endpoint health and performance.
  • Discuss proactive recommendations based on Microsoft Cloud data.
  • Explain how to improve user experiences and productivity.

สรุปย่อ

https://store-images.s-microsoft.com/image/apps.51136.395cff64-26d0-4fee-9c04-242bd3b28398.35560320-05eb-494c-b862-0827909f942d.b10a837a-3f73-4122-8227-7879ddc15358
https://store-images.s-microsoft.com/image/apps.21064.395cff64-26d0-4fee-9c04-242bd3b28398.35560320-05eb-494c-b862-0827909f942d.ab728900-b0e1-42d6-b916-d10260b26f1e