1 d
Intune best practices checklist?
Follow
11
Intune best practices checklist?
Enrolling devices and decision-making regarding this is a critical step in Learning Microsoft Intune. It's easy to create a Configuration Profile from a MDM Security Baseline in Intune. Notices Limit the use of Domain Admin privileges. Guides that consolidate information specific to a platform or industry Resource to find information about related services, such as Microsoft 365. Ensure a robust security posture, including these periodic hardening actions, with IntegriCom’s Managed IT Services. We align diligently with Microsoft's best practices. Using Security Baselines. Here you will be able to enable the cleanup rule to delete devices that haven't checked in for {X} days; the minimum is 90. Checklists are used in several different fie. Actually the first in a 5 part series of posts that was co-authored with David Colville, a friend in Australia. Best Practice #1: Organizations should only deploy the MAM function first. You can create a dedicated resource account in Azure AD. Next, select Profiles, and then select the check box for the profile you want to edit, and then select Change Version. Get info on GPO, features, restrictions, email, wifi, VPN, education, certificates, upgrade Windows 10/11, BitLocker and Microsoft Defender, Windows Information Protection, administrative templates, and custom device configuration settings in the Microsoft Intune admin center. One of the most effective ways to approach this impo. Notices Limit the use of Domain Admin privileges. Assign licenses to users. In this article, we discuss a collection of Azure identity management and access control security best practices. Co-management enables you to concurrently manage Windows 10 or later devices by using both Configuration Manager and Microsoft Intune. Web site Printable Checklist is a stripped down checklist creator that makes building quick, printer-friendly custom checklists a breeze. A housekeeper duties checklist keeps track of the regular tasks needed in order to keep a house clean and orderly. MS365 - The road to Zero Trust Aug 15, 2023 Here are some best practices for managing Intune that can optimize your deployment, enhance security, and provide a seamless experience for users. This solution is future-proof When you take a look at the Desktop (43 Mobile (52 Yes 9/10. For MEM, go to Devices > Feature updates for Windows 10 and later (Preview). Keep the best practices in mind: Don't create your own version of "All users" or "All devices" groups. Includes checklists and corresponding implementation guides for the main Microsoft 365 services, including Microsoft Entra ID, Microsoft Intune, Microsoft Exchange Online, SharePoint Online, and more! Since I would like the Best Practices to be available everywhere in the world, regardless of market, this is now a free publication. This article includes an admin checklist for enrolled and managed Android Enterprise devices. Virtual desktop infrastructure (VDI) is an IT infrastructure that virtualizes desktops—to give employees access to enterprise data and applications from anywhere and from most personal and professional devices. The systems won't run through the full Autopilot provisioning process but will join Entra and will get enrolled into Intune assuming personal enrollment isn't blocked as they will be marked. They must make sure this app data stays within the organization. Dec 19, 2023 · Use the Intune Configuration Manager co-management setup guide to set up existing Configuration Manager client devices and new internet-based devices that your org wants to co-manage with both Microsoft Intune and Configuration Manager. Dec 12, 2022 · Let’s download Intune Configuration Spreadsheet Excel List of Policies Configurations. The Microsoft 365 Security Checklist shows you all the security settings and configurations you need to know for each M365 license to properly secure your environment. Set up Intune, including setting the MDM Authority to Intune. Azure data security and encryption best practices. Harmonizing your device management with Microsoft Intune requires not just the right tools, but the mastery of best practices. Next, create a device configuration profile that automatically onboards Intune assets to. Place the machine behind the firewall—production Windows Server instances should always run in a protected network segment. On personal devices, IT admins typically don't have any control of software updates. The policy pack includes over 100 different policies, covering everything from device security to user experience. A guided scenario is a customized series of steps centered around one end-to-end use-case. The Center for Internet Security is a nonprofit entity whose mission is to 'identify, develop, validate, promote, and sustain best practice solutions for cyberdefense. 0 or later, and Knox 4 Note. Sign in to the Endpoint Manager portal with an Intune admin access account. Tame the Device Zoo with Intune OBS Studio, short for Open Broadcaster Software Studio, is a popular open-source software used by content creators to capture and stream their screen, gameplay, or live events Internal audits are an essential part of maintaining an effective quality management system (QMS) in accordance with the ISO 9001 standard. Setup App protection policies. We've enabled a new custom setting called "Restrict legacy JScript execution for Office" in the baseline and provided it in a separate GPO "MSFT M365 Apps for enterprise 2104 - Legacy JScript Block - Computer. You can also manage your deployment from the Microsoft 365 portal and. Whether you’re creating a new account or refreshing your existing one. Simplify endpoint management and security with a single, connected experience with the Microsoft Intune Suite. Navigate to Devices > Windows devices > Configuration profiles. Whether you’re a first-time buyer or looking to upgrade your current vehicle, it’s crucial to have a chec. Name the profile in the Basics tab of the Create profile pane. Of tips include best practices for decision-making, making policy compliance, maintaining data site, and whatnot. An observation checklist is a list of questions that an observer will be looking to answer when they are doing a specific observation of a classroom. Remove the device from the devices in the Azure portal. Devices receive the profile once they enroll Microsoft 365 SMB Best Practices Checklists - ITProMentor - The excel has an Intune Checklist and some Conditional Access examples. Use your existing devices and use new devices. App management can be challenging and Intune can help. You will be prompted to enter your admin user name and upon sign-in, grant permissions to the Intune Graph (one. Select the platform to which the compliance policy will apply Select the platform for the compliance policy. May 20, 2021 · This blog post describes best practices to enroll users, set up certificates, assign access and permissions, and multiple applications assignments. Seeking Guidance on Configuring Best Practice Policies in Intune for Azure Devices. For more information, go to: Get started with your Microsoft Intune deployment. Best Practice #1: Organizations should only deploy the MAM function first. (Step 3) This will bring out the flyout card and I will select the folder icon to import each gpreport The first step what you has to do is to download the Company Portal from the following link on your Mac device. An observation checklist is a list of questions that an observer will be looking to answer when they are doing a specific observation of a classroom. If you assign these policies to devices, you will find that there are two compliance results for every device (well, actually. Platform support is given for all of them, resulting in the fact that you only need one product for all. The Intune Connector requires the same endpoints as Intune Set up Windows automatic MDM enrollment. Use jump boxes for RDP access or MMC access. Secure your company information by controlling the way users access and share information. At any time, users can open the Company Portal app, and sync the device to immediately check for profile updates. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"Exchange Online","path":"Exchange Online","contentType":"directory"},{"name":"Setup Intune. Organization and enterprise application workloads have recovery time objective (RTO) and recovery point objective (RPO) requirements. A successful retirement doesn’t come automatically when you turn 65. Select + Create profile and choose Windows 10 and later for the Platform and Settings catalog for the Profile type, then select Create. Table 1: Microsoft 365 and Intune Security Baselines. Here is a link to the checklist, summarized in an Excel spreadsheet. If you use hybrid Mobile Device Management (Hybrid MDM), As a security best practice, we recommend you disable legacy JScript execution for websites in Internet Zone and Restricted Sites Zone. Secure your company information by controlling the way users access and share information. Azure AD groups provide a streamlined approach to regulate access within Microsoft Intune, and it is considered one of the best practices to ensure secure access management to your IT network Apply Mobile Application Management (MAM) regulations to apps. Google Play may not be accessible on dedicated devices, depending on whether the device is using Managed Home Screen. On the Basic tab, specify the name of the profile and add a brief description. a)Based on my understanding, corporate or personal is defined in Intune. Thanks for your support! Similar in the checklist to Azure AD which I recently published, this imagination is designed to get you up and management quickly with what I consider in be a good "baseline" for greatest minor additionally […] Configure and deploy policies for devices you manage with endpoint security attack surface reduction policy settings in Microsoft Intune. csv file you previously copied to your local computer. The settings in this baseline are taken from the version 23H2 of the Group Policy security baseline as found in the Security Compliance Toolkit and Baselines from the Microsoft Download Center, and include only the settings that apply to Windows devices managed through Intune. These audits help organizations identify. Control device features and assign policies to device groups Managing devices is a significant part of any endpoint management strategy and solution. There are differences between the guidance provided by NCSC, CIS, and Microsoft's pre-configured security baselines for Intune. Schedule a consultation today to fortify your defenses against evolving cyber threats. Enroll devices. decieve inc rule 34 Check the compliance health of your devices. These recommendations are based on guidance and extensive experience. While the intent of these policies is to assist in an organisations compliance efforts, Microsoft does not represent that use of these policies will create. Compliance policies. On the Basic tab, specify the name of the profile and add a brief description. Intune and Configuration Manager SQL Server Connect and learn from experts and peers. Microsoft FastTrack. This efficient environment will help reduce application risk before deploying on organization devices. Configure device settings. This blog post describes best practices to enroll users, set up certificates, assign access and permissions, and multiple applications assignments. Remember, MDM does not require a separate site in the Configuration Manager hierarchy. However, due to the complicated nature of IoT, when implementing and managing IoT, security must be. 1 answer. Checklists are used in several different fie. This book is for you! Linking off to the recently published (early 2021) book by Endpoint Manager product owner Scott Duffey - a great read. Intune and Configuration Manager SQL Server Connect and learn from experts and peers. Microsoft FastTrack. Combine user and device assignments carefully: When deploying applications, consider using filters to blend. how to dispose of medicine A role-based copilot designed for sellers Education Sector. In this article About CIS Benchmarks. - Anti-spam, anti-malware, and anti-phishing protection for email - Advanced threat protection for email and Office documents: 6. Step 2 - Add, configure, and protect apps with Intune. Note: Users will need a Microsoft Intune license, see Licenses available for Microsoft Intune to determine. Remember, MDM does not require a separate site in the Configuration Manager hierarchy. If you are managing Windows endpoints today in Configuration Manager, your next step toward modern management would be to enable cloud console and additional cloud values by attaching your Configuration Manager infrastructure to Microsoft Endpoint. Of tips include best practices for decision-making, making policy compliance, maintaining data site, and whatnot. In the Microsoft Intune admin center, select Apps > All apps > select the related app *. If an admin decides to revoke a token , the profile associated with it will not be displayed in Devices > By platform > Android > Device onboarding > Enrollment > Corporate-owned devices with work profile. Notices Limit the use of Domain Admin privileges. exe's) Auto-deploy Office for Business / Office for Enterprise. In this article, we discuss a collection of Azure identity management and access control security best practices. You can also monitor compliance with security baselines Over the years, I have compiled "Best practices" checklists and implementation guides for several popular Microsoft cloud services, for example: Microsoft Entra ID + Conditional Access Microsoft Exchange Online. Select the platform "Android Here, we share with you a framework that we have built. In the Intune admin center, if the Connection status at the top of the Microsoft Defender for Endpoint page is already set to Enabled, the connection to Intune is already active and the admin center displays different UI text for the link. Find this option in the Microsoft Intune admin center > Devices > Feature Update for Windows 10 and later > Create Profile. For the issue 1), I will share some information about it. Deploying Conditional Access. If you use Microsoft Intune, simply create your feature update deployment as usual. www flsmv gov Harmonizing your device management with Microsoft Intune requires not just the right tools, but the mastery of best practices. The timing of these updates varies depending on the carrier, OEM, and the device itself. In the Microsoft Intune admin center, select Apps > All apps > select the related app *. Are you in the market for a new Toyota vehicle? The first step towards finding your dream car is selecting the right dealership. App Deployment & Patching Best Practices w/ MVP Johan Arwidmark. Dec 1, 2022 · Using Azure AD groups is an efficient way to manage access in Microsoft Intune, and it’s one of the best practices for ensuring secure access to your environment Create a device compliance policy for each platform. Update Public Alerting Application (PAA), obtain state(s) approval, provide to IPAWS. Tip. Security best practices for Office 365 Create your identity strategy. They must make sure this app data stays within the organization. Are you in the market for a new home? With so many options available, it can be overwhelming to find the perfect home that fits your budget In this article, we will. I just finished updating the Conditional access design guide, part of the Microsoft 365 Best practices checklists. Intune for Education. Selecting the gpreport Next, we will import the three STIGs in the next several steps. This solution is future-proof When you take a look at the Desktop (43 Mobile (52 Here, we’ll share our favorite mobile device management best practices for Microsoft Intune, acquired from years of experience in system administration roles Utilize Conditional Access Policies: Leverage conditional access policies (CAP) to set advanced device compliance rules and enforce them on a regular basis Description.
Post Opinion
Like
What Girls & Guys Said
Opinion
28Opinion
Best practices and other considerations: Users must have access to Google Play to set this policy. Navigate to Devices > Windows devices > Configuration profiles. Never use a personal Apple ID In the Device Management Admin Center go to Device Enrollment>Apple Enrollment>Apple MDM Push Certificate b. MS365 - The road to Zero Trust Aug 15, 2023 Here are some best practices for managing Intune that can optimize your deployment, enhance security, and provide a seamless experience for users. In conclusion, adopting these best practices for hardening Microsoft 365 is paramount in safeguarding your organization’s digital assets. You can remotely lock, restart, locate a lost device, restore a device to its factory settings, and more. Actually the first in a 5 part series of posts that was co-authored with David Colville, a friend in Australia. Next to the GPO you want in your Settings Catalog profile, select the Migrate checkbox. I will be updating the best practices checklist and guide for Azure AD again soon, but I wanted to post a couple of notes about the coming changes--since it may be a while before I get around to editing and publishing Technical Azure AD, Azure AD Premium, best. Oct 23 2023 07:28 AM. Best practices and the latest news on Microsoft FastTrack. FastTrack provides you with a set of best practices, tools, resources, and experts committed to helping you deploy Microsoft 365. Dec 24, 2020 · Hopefully, these best practices will give you enough of a bearing to get started grappling with that complexity Conditional Access. Dec 12, 2022 · Here is a detailed explanation of windows compliance policy best practices you can utilize in your network via Intune. Best practice: Protect confidential data from being shared with external users Detail: Create a file policy that detects when a user tries to share a file with the Confidential sensitivity label with someone external to your organization, and configure its governance action to remove external users. See Protect yourself against phishing and other attacks. rule 34 eren yeager This efficient environment will help reduce application risk before deploying on organization devices. Apple ID used to create it. Of tips include best practices for decision-making, making policy compliance, maintaining data site, and whatnot. Train everyone on email best practices. The Microsoft 365 Security Checklist shows you all the security settings and configurations you need to know for each M365 license to properly secure your environment. Planning a wedding can be an overwhelming task. Here you will be able to enable the cleanup rule to delete devices that haven't checked in for {X} days; the minimum is 90. Create Configuration Profile in Intune for Bitlocker Deployment. Use the Intune virtual groups, as they don't require Microsoft Entra ID syncing when a new user or device is added to the environment. Dec 6, 2022 · 1. You will be prompted to enter your admin user name and upon sign-in, grant permissions to the Intune Graph (one. Choose an existing policy or create a new one. We can push profiles to the OS via pre-defined templates or custom ones (. For more information, go to Remote actions in Intune Manage. If you would `like to see other blogs post about best practices for other platforms like macOS, ios, and android, do rate this blog post and subscribe to the newsletter. Step 4. A guided scenario is a customized series of steps centered around one end-to-end use-case. Deploy apps and create app protection policies. Collaboration apps (e, SharePoint Online, Teams, OneDrive for Business) And more. Thanks for your support! Similar to the checklist for Azure AD which I recently published, this resource is designed to get you up and running quickly with what I consider to be a good "baseline" for most small and mid-sized organizations. Simplify endpoint management and security with a single, connected experience with the Microsoft Intune Suite. The Microsoft 365 Best Practices Checklists, including Microsoft Entra ID, Intune, Exchange Online, and Collaboration Apps (e, SharePoint Online, OneDrive for Business, and Teams). In this article, we will provide you with the ultimate checklist for buying very cheap vans near you Buying a car is an important decision that requires careful consideration. ITProMentor has an Intune guide as well. See an overview of the steps to start using Intune. Since I would like the Best Practices to be available everywhere in the world, regardless of market, this is now a free publication, but you can also choose to support this work with any amount you like. gislsway Additionally, you can set a policy in Microsoft Entra ID to only enable domain-joined computers or mobile devices that are enrolled in Intune to access. This launches the Windows 10/11 compliance policy creation wizard. Guidance around SharePoint and OneDrive onboarding, migration, and adoption are included in the benefit offering. For MEM, go to Devices > Feature updates for Windows 10 and later (Preview). Schedule a consultation today to fortify your defenses against evolving cyber threats. Whether you’re a first-time buyer or looking to upgrade your current vehicle, it’s crucial to have a chec. In conclusion, adopting these best practices for hardening Microsoft 365 is paramount in safeguarding your organization's digital assets. Practice responding to events. Configure a new Intune compliance policy. This checklist will cover the basics. A checklist is a comprehensive list of crucial tasks to be completed in a specified order; this ensures no important step is forgotten. Deploy and monitor Windows updates using Microsoft Intune. Azure data security and encryption best practices. Then create a policy. Select a baseline in the list and create a new profile from that. Use the Intune virtual groups, as they don't require Microsoft Entra ID syncing when a new user or device is added to the environment. Dec 6, 2022 · 1. It only makes sense to shift all your device workloads to be. Secure your company information by controlling the way users access and share information. The end-user experience provides several different pages. If you wonder which account should I enter here, you should create a user in Microsoft 365 Admin Center. Collaboration apps (e, SharePoint Online, Teams, OneDrive for Business) And more. The policy pack includes over 100 different policies, covering everything from device security to user experience. Navigate to the Microsoft Endpoint Manager admin center Select Tenant administration > Tenant status > Service Health > Message center. ford build sheet codes Common task may include enrolling devices, installing apps, and locating information (such as for assistance from your IT department). ITProMentor has an Intune guide as well. May 16, 2024 · A guided scenario is a customized series of steps centered around one end-to-end use-case. You can use Microsoft Intune to manage the apps that your company's workforce uses. To get started, go to the Devices blade in Intune portal and navigate to "Device cleanup rules". If you use hybrid Mobile Device Management (Hybrid MDM), As a security best practice, we recommend you disable legacy JScript execution for websites in Internet Zone and Restricted Sites Zone. Our engineers are certified by Microsoft, VMware (AirWatch) and MobileIron. Train everyone on email best practices. Note: For a summarized checklist of all the best practices, see the Checklist summary at the bottom of this guide. Summary of the checklist with links to Microsoft sources: Create security groups for Intune deployment rings. Configure Windows 10 software update rings. My Modern Workplace Application Vision Source: A framework for Windows endpoint management. If you need to manage your macOS devices in an Enterprise. You signed out in another tab or window. If the IT admin sets a network configuration in Intune, it will override the user network configuration setting. Before starting the migrations,please make sure that you are on the most suited MDM pricing plan. If you are managing Windows endpoints today in Configuration Manager, your next step toward modern management would be to enable cloud console and additional cloud values by attaching your Configuration Manager infrastructure to Microsoft Endpoint. The end-user experience provides several different pages. Account driven user enrollment for iOS. Office Technology | How To REVIEWED BY: Corey McCr.
The Intune Adoption Kit includes customizable email templates, a customizable Intune enrollment guide, a poster, and links to instructional videos and demos to help users enroll their iOS/iPadOS and Android devices to Intune. System Requirements. Limit privileged administrator role assignments. By following these tips, your organization can be sure that they are using Intune to its maximum ability. Create an enrollment profile in the Intune admin center, and have your dedicated device group ready to receive the profile. This is where you'll find the landing page for managing your Cloud PCs which is known as the Overview tab. Thanks for your support! Similar to the checklist for Azure AD which I recently published, this resource is designed to get you up and running quickly with what I consider to be a good "baseline" for most small and mid-sized organizations. peterbilt relay location Hopefully, you will be able to incorporate some of these recommendations when creating and managing assignments in Intune. Common task may include enrolling devices, installing apps, and locating information (such as for assistance from your IT department). Chronologically, the first thing you’ll need to deal with are enrollment settings—which you can find in the next section. As a companion to this article, we recommend using the Microsoft Teams Rooms automated setup guide when signed in to the Microsoft 365 admin center. ann taylor black dresses Example 1: Enable data collection for Intune Company Portal. This policy ensures your confidential data. Of tips include best practices for decision-making, making policy compliance, maintaining data site, and whatnot. The Center for Internet Security is a nonprofit entity whose mission is to 'identify, develop, validate, promote, and sustain best practice solutions for cyberdefense. As an Intune administrator, use these compliance settings to help protect your organizational resources To learn more about compliance policies, and what they do, see get started with device compliance. To create an iOS/iPadOS device compliance policy, see Create a compliance policy in Microsoft Intune. By default, when a new update is available for unmanaged devices (not enrolled in Intune), users receive notifications and/or see the latest updates available on their devices (Settings > Software Updates). is 53rd bank open today So today I'm happy to announce that I'm releasing an Office 365 Email Security Checklist along with a couple of scripts! Help put these ridiculous reports and security incidents to rest once and for all. With a wide variety of cars for sale, it’s important to know what to look for to ensur. We can push profiles to the OS via pre-defined templates or custom ones (. To get started, go to the Devices blade in Intune portal and navigate to "Device cleanup rules". If you would `like to see other blogs post about best practices for other platforms like macOS, ios, and android, do rate this blog post and subscribe to the newsletter. Step 4.
Tokens for corporate-owned devices with a work profile will not expire automatically. Intune evaluates the settings that policy merge supports, for each user or device as taken from all applicable policies. Dec 1, 2022 · Using Azure AD groups is an efficient way to manage access in Microsoft Intune, and it’s one of the best practices for ensuring secure access to your environment Create a device compliance policy for each platform. Intune and Configuration Manager SQL Server Connect and learn from experts and peers. Microsoft FastTrack. These best practices are derived from our experience with. Here, we'll share our favorite mobile device management best practices for Microsoft Intune, acquired from years of experience in system administration roles Utilize Conditional Access Policies: Leverage conditional access policies (CAP) to set advanced device compliance rules and enforce them on a regular basis Description. Looking for a step-by-step guide on how to set up an office? Here’s how to do it in 5 easy steps, complete with a free checklist. At the time of purchase the vendor enrolls the device into Autopilot and ships the computer to the end user. Update Public Alerting Application (PAA), obtain state(s) approval, provide to IPAWS. Tip. Additional Intune policies have been provided for organisations who are also required to comply with the ACSC's Office Hardening Guidance and the ACSC's Office Macro Security publication. You switched accounts on another tab or window. The rule allows us to choose between 90 and 270 days to automatically remove inactive/obsolete device records from Intune. In this article, we’ll guide you. A role-based copilot designed for sellers. qvc.syf.com pay bill There are differences between the guidance provided by NCSC, CIS, and Microsoft’s pre-configured security baselines for Intune. The ones I usually exclude is the test groups that I have in my current environment that I've created. Select More services, enter Intune in the text box, and then select Enter. Instead of users entering the Intune server name, you can create a CNAME record that's easier to enter, like EnterpriseEnrollmentcom. OneDrive silent sign in & known folder move. Complete the following prerequisites to enable macOS device management in Intune: Add users and groups. Best practices for enrolling shared devices in Intune We need to enroll a couple of computers as shared devices in Intune. The deployment acceleration guides (DAGs) are written and updated continually by the global Compliance CxE team and are a resource designed to help with the following: One Compliance Story covering how each solution complements each other. If you assign these policies to devices, you will find that there are two compliance results for every device (well, actually. There are endless opportunities and possibilities using Intune. Before starting the migrations,please make sure that you are on the most suited MDM pricing plan. One of the most effective ways to approach this impo. Are you in the market for a new van but have a tight budget? Look no further. Tokens for corporate-owned devices with a work profile will not expire automatically. Web site Printable Checklist is a stripped. flavor of the day culver When it comes to Compliance policies, you can technically target either user or device groups. Take advantage of virtual groups and filters to help refine the scope of your Azure AD groups, and keep these best practices in mind: Use Intune virtual groups that don’t require Azure AD syncing. Updates coming soon to the Azure AD Best practices checklist Update: The best practices checklists and guides are now available. With this integration, you can then monitor device risk as a condition for access. Select the profile from the list of available profiles, and then select Properties. Start by setting up a separate Azure Active Directory tenant for each Microsoft cloud service. Microsoft Intune Windows Driver Update Management allows you to review, approve for deployment and pause deployments for driver updates for your managed Windows 10 and Windows 11 devices. Web site Printable Checklist is a stripped down checklist creator that makes building quick, printer-friendly custom checklists a breeze. Security baselines are supported for devices that run. Establish a governance structure for cloud services. 1. Structured Guidance. This article explains how to enroll the Zebra Android device via QR code token as a corporate-owned dedicated device with MS Intune. 1. Azure checklist to check your environment to make sure that best practices are being followed. Enter the App information and click Next at the bottom. Cost Structure of Microsoft Intune : Plan: Price per user per month: This article is a reference for the settings that are available in the different versions of the Microsoft Defender for Endpoint security baseline that you can deploy with Microsoft Intune.