This article is contributed. See the original author and article here.
If you want to effectively manage your organization’s devices—and ensure a secure, productive user experience—with the increased focus on remote work, check out our on-demand web series titled Enabling remote work for IT pros in the Business Continuity community. Each episode offers an in-depth look at what you can do immediately, in the next few weeks, and over the next few months to maintain control over, and help ensure the security of, your organization’s devices while users are working away from your corporate networks. They also address frequently asked questions and offer links to step-by-step resources to help you implement the strategies and best practices discussed.
Note: This blog post will be updated as new sessions are published. Bookmark it, subscribe to updates, or follow us @MSWindowsITPro on Twitter to stay informed on the latest episodes.
New this month
- Microsoft Secure Hybrid Access: Part 1
Learn how to use Azure AD Application Proxy to support remote access scenarios with greater security and enable functionality like real-time application access monitoring.
- Microsoft Secure Hybrid Access: Part 2
See demos of key partner integrations, specifically F5, Zscaler, Akamai, and Citrix.
- Cloud attach and Microsoft Endpoint Manager
Explore the phases of cloud attach as well as tenant attach. Get valuable information on prerequisites, licensing information, dashboards, and more.
- Managing quality updates via Windows Update for Business
Learn how to use Windows Update for Business in tandem with Microsoft Intune, Configuration Manager, or Group Policy to ensure devices remain up to date.
- Transitioning state data to the cloud in remote work scenarios
Ensuring the preservation, and roaming of user state data, specifically applications and shell settings, is crucial as that state data is often personalized and tailored to individual users. Learn how to manage roaming state data via the cloud instead of on-premises technologies over VPN.
- Securing Windows devices away from the corporate network
See sample timelines for accelerated approaches, including ways to optimize the impact of virtual private networks (VPNs) and minimize overall workflow disruption.
- Provision Windows devices from anywhere to support a mobile workforce
Effectively provision Windows devices from anywhere and better understand how to leverage Azure AD Join with Microsoft Intune, or Configuration Manager co-management and task sequences.
- Ensure personal iOS, Android, and Windows devices are configured for security and productivity
Configure personal devices to ensure security of your corporate data and learn how to manage iOS, Android, and personal Windows devices.
- Cloud management gateway (CMG): what you need to know & what’s next
Sidestep potential issues as you enable the cloud management gateway to manage your Configuration Manager clients on the internet, and explore next steps.
- Cloud management gateway deep dive
Look at infrastructure, enablement guidelines, and tips on how to reduce reliance on VPN so you can start designing a CMG plan for your Configuration Manager environment.
How can we help?
We hope you find this series useful—and would love your feedback and ideas for future sessions. Fill out this short survey to let us know what topics, technologies, and best practices you’d like to see! Thank you!
Stay informed. For the latest updates on new releases, tools, and resources, stay tuned to this blog and follow us @MSWindowsITPro on Twitter.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.