MD-101 Managing Modern Desktops – Managing and Deploying Apps and Data Part 1

Assigning apps using Intune Let’s take some time now and talk about the capabilities of Intune in regards to the way it deploys apps. So one of the great features about Intune, not only can we configure all these settings on devices and make sure they’re compliant and all that fun stuff, we can also actually manage apps. So remember that Intune, with the help of Endpoint Manager here, has the ability, ability to support not just MDM mobile Device management, but also Mam, which is mobile application management. We’re…

MD-101 Managing Modern Desktops – Implementing Mobile Application Management (MAM)

Managing and implementing MAM App Protection policies with Intune Now I want to take a look at some of the ways that we can help protect our apps and control some of the settings, as well as making sure that users aren’t utilizing apps and sharing data with people they shouldn’t be sharing data with and utilizing the apps in ways that they shouldn’t be using the app. So I’m going to go here and click on the Apps blade here in Endpoint Manager. This is is endpoint Microsoft. com….

MD-101 Managing Modern Desktops – Implement conditional access and compliance policies for devices Part 2

Understanding device compliance policies What exactly are compliance policies? So compliance policies in entune this is going to allow you to define some rules that are essentially going to check certain settings on a person’s device to make sure that they meet a certain criteria, okay? And of course, if they don’t meet a certain criteria, then a couple of things can happen. You can have reports being generated, auditing can occur. Or if you’re working with conditional access, you can actually have the device blocked, you can force it…

MD-101 Managing Modern Desktops – Implement conditional access and compliance policies for devices Part 1

Understanding conditional access policies Conditional access is a feature that helps monitor the different things users are doing in your environment. The different applications they’re trying to access, different data they’re trying to access. But also it looks at where they’re coming from in regards to those things. So in other words, for example, maybe I have an iPhone Seven and I want to check my Exchange Online email using the Outlook app. Or maybe I’ve decided that I want to download a totally different app that’s not approved by…

MD-101 Managing Modern Desktops – Configuring device profiles

Understanding and planning device configuration profiles I now want to spend some time going over one of the extremely powerful capabilities we have with Intune through the Endpoint Manager, okay? And this is called device profiles. Okay? So you might have heard me say previously that we don’t have group policies in Intune with MDM, but we have something very similar. And what it is, is this thing called device configuration profiles. Device Configuration profiles allow me to control the different settings that are on people’s devices, whether they’re Windows,…

LPI 010-150 – Text Processing Tools

Concatinating Files The Cat command is one of the most universal tools. All it does is copy standard input to standard output in combination with the shell. This can be very powerful. You can use Cat to display the content of a file. For example cat attcut resolve it will display the content of attic resolveconf file. And we can use Cat to cool Cat in a file into a bigger file. For example, we have here part one file. It contains one line and if we get part two,…

LPI 010-150 – Text Files Editing

vi Editor Basics Basics of VI or Vim Editor the VI editor is installed on almost very Unix distribution, and Vim is by default installed in the most Linux distributions. VI and Vim both are similar. Every system administered reader should know VI or Vim because it’s an easy tool to solve many problems. VI or Vim has three modes command Mode the VI editor starts in Command mode. In Command mode, you can type comments. Some comments will bring you to another mode called Insert Mode, and in the…

LPI 010-150 – Linux Users and Groups Management

Linux Users Management Introduction Linux Users Management in Linux every user is assigned a unique user ID number UID the operating system will manage this user through its ID number and UID zero identifies root user which is the administrator or the super user of the operating system. User information like the username and the user ID are stored in tickets, file called etc password. When we create a new user the system will assign a home directory and a program that is run when the user login. This program…

LPI 010-150 – Investigating and Managing Processes

Describe how to manage processes In this lesson we will learn Linux process. The process is a set of instructions loaded into the memory. For example if we run the firefox, then the firefox is considered as a process and each process has process ID used to identify the process and etsy process has UID and GID and Se Linux context which determine the file system access level and these attributes normally inherited from the executing user. If we run PS command it will display the processes from the current…

LPI 010-150 – Browsing the Filesystem

Copying Files Let’s use LS for the current directory to list the contents of the current directory and to display where I am, I will use PWD. So to copy a file use Command with a source and a target argument for example the source which we will use in our example file one which is located in the current working directory which is homemeassine and we will copy this file one two tentdirectory. So if we list temp directory we will see that file zero one is there. To…

img