Summary

Completed

In this module, you’ve learned how to improve your organization’s overall level of security, from the device chip level, all the way up to the cloud. You used Microsoft Intune tools to advance your Zero Trust security posture, which included the configuration of hardware security, operating system, application security, privacy controls, and more.

Now that you’ve completed this module, you can:

  • Use Microsoft Intune tools for modern device management
  • Use and improve cloud-based security
  • Use and improve secured identity
  • Use and improve privacy controls
  • Use and improve application security
  • Use and improve operating system security
  • Use and improve hardware security
  • Improve your security posture now and on an ongoing basis.

Resources

Learn more about the topics discussed in this module: