<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Deployment on Ru Campbell MVP</title>
    <link>https://campbell.scot/tags/deployment/</link>
    <description>Recent content in Deployment on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Mon, 10 Jul 2023 20:47:03 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/tags/deployment/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Microsoft Improves and Simplifies Defender for Endpoint Management Capabilities</title>
      <link>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</link>
      <pubDate>Mon, 10 Jul 2023 20:47:03 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</guid>
      <description>&lt;p&gt;In one of the biggest changes to Microsoft Defender for Endpoint (MDE) in its product history, you no longer need a separate management engine to configure endpoint settings.&lt;/p&gt;
&lt;p&gt;In this blog, we&amp;rsquo;ll look at what that change is, why it was necessary, initial impressions, and what you might want to do next.&lt;/p&gt;
&lt;h2 id=&#34;historic-management-architecture-needed-simplifying&#34;&gt;Historic management architecture needed simplifying&lt;/h2&gt;
&lt;p&gt;MDE (and it&amp;rsquo;s Windows client, Microsoft Defender Antivirus (MDAV)) always stood out from the crowd of endpoint protection platforms as being, well, a bit &lt;em&gt;weird&lt;/em&gt; in terms of management architecture. With most platforms, you get a central admin console which pushes out endpoint settings. Think scan schedules, quarantine rules, exclusions, CPU throttling, etc. MDE/MDAV, on the other hand, instead relied on an external management tool such as Intune (MDM), Configuration Manager, or Group Policy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploy Microsoft Store Apps using Intune with Configuration Manager (SCCM) Co-Management (Fix &#39;Not Applicable&#39; Status)</title>
      <link>https://campbell.scot/deploy-microsoft-store-apps-using-intune-with-sccm-co-management-fix-not-applicable-status/</link>
      <pubDate>Fri, 10 Jan 2020 21:00:30 +0000</pubDate>
      <guid>https://campbell.scot/deploy-microsoft-store-apps-using-intune-with-sccm-co-management-fix-not-applicable-status/</guid>
      <description>&lt;p&gt;Intune provides an interface to easily deploy apps from the Microsoft Store to your registered users and devices, but even if you have SCCM (Config Manager) Co-Mangement enabled with the default workloads shifted to Intune in Co-Management properties, there is more to be done.  If you don&amp;rsquo;t follow these steps, you will receive the status of &lt;strong&gt;Not applicable&lt;/strong&gt; in the Intune client apps user and device install status pages.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;00.-Not-Applicable-in-Intune&#34; loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/00.-not-applicable-in-intune.png&#34;&gt;&lt;strong&gt;Prerequisite:&lt;/strong&gt; This only works with SCCM 1806+.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
