Improving adds value to our customers through our Cloud Solution Provider (CSP) offering which makes expertise and resources available often only offered through complex managed services agreements or engagements. Improving CSP enables our customers to have flexibility in their Microsoft cloud services licensing while offering direct access to our industry experts and a hands-on approach to ensuring your cloud presence is secure and efficient.
Improving CSP can offer complete Microsoft cloud services, including Microsoft 365, Office 365, Enterprise Mobility + Security, Windows, Dynamics 365 and Azure. Although licensing is a large piece of being a CSP, Improving values and prioritizes our customer relationships above all to ensure maximum value and efficiency with Microsoft cloud services.
Our CSP Webinar Series for 2021 focuses on establishing a strong endpoint management strategy and using Microsoft cloud to operate and maintain your endpoint environment. Over the course of our twelve part series, we’ll start with putting the foundational pieces in place and build upon that with each session by providing detailed guidance and insights on expanding your endpoint management capabilities. By the end of the series, we will have established a strong endpoint management strategy and enabling all the technical pieces to get there. Let 2021 be the year you take full control of your endpoints.
You've probably heard of Defender for Endpoint, formerly Windows Defender ATP, but do you know how to respond to active threats and attacks against your devices? In this session, we will take a deep dive into Defender for Endpoint and show you how to set it up and actively use it. Responding to active attacks against your devices may seem like something only the largest companies out there can do in real-time, but we'll show you how Defender for Endpoint makes this possible for everyone. Join us to learn how to properly use Defender for Endpoint to monitor and thwart attacks in your environment.
Endpoint encryption may just be one tool in your security toolbox, but it is an important one! BitLocker has been around since the Windows 7 days, but how well do you really know how to use it? As we move more to cloud, BitLocker management is no exception. In this session we will take a closer look at how to properly enable and use BitLocker in a cloud-first world, as well as identify where many companies stumble with using endpoint encryption.
In a work environment that has just seen the impacts of remote work, getting new devices into the hands of employees has become much more challenging. With the evolution of Windows 10, the practice of device "imaging" is changing. Join us as we demonstrate how you can spend less time preparing Windows 10 devices and getting them into the hands of your employees. We'll walk you through how to prepare and enable Windows Autopilot, how to avoid common pitfalls, and give your employees flexibility in device choice and preference.
Mobile device management (MDM) was born out of the early days of smartphones, but thinking of MDM for only mobile devices is missing the Big Picture. Why would you want to enroll your Windows devices? What benefit does that provide? How do you manage Windows device enrollment? These are all questions we'll answer in this session as well as provide you guidance on getting started and enabling Windows device management in Microsoft Endpoint Manager.
If Windows 10 is the last version of Windows and it will continually evolve rather than be replaced, how do we keep our Windows 10 devices updated? Keeping up with the support cycle and the modern update channels driven by a cloud first world can be confusing and challenging. In this session, we will clarify what the Windows 10 Lifecycle is and how to keep on top of it. We will demonstrate how to properly manage Windows 10 and prepare for major updates. Gone are the days of new OS upgrades. Welcome to the new world of OS management.
Retiring devices used to be as simple as removing from the Active Directory domain, wiping the hard drive, and donating the computer to a local charity. With the average employee using at least three devices, some owned by the company and some owned by the employee, how do you manage the cleanup? Ensuring outdated Azure AD device registrations, Microsoft Endpoint Manager device enrollments, and managed apps registrations don't clutter your environment and potentially result in undesired access can be a challenge. As we wrap up our endpoint management series, we take a look at how to properly manage device retirement. During this session we will demonstrate the proper way to make sure your environment stays clean and uncluttered, and devices that should no longer be used are fully removed.
As an Improving CSP Customer, our focus is on ensuring we provide the best service and relationship possible. As the year winds down, we want to make sure we have addressed all of your feedback, requests and concerns and make sure we continue to provide you with the most value possible from our webinar series. In this session, we'll respond to all open feedback items from all of our previous sessions. But we also encourage you to come and try to stump us with any new questions you may have that we can answer for you.
We wrap up our 2021 webinar series with a round table discussion on technology and security trends and events from this past year. As we lead into 2022, we'll recap emerging technologies, where we see Microsoft's vision on cloud going and the new threat landscape we all should be preparing for.
Did you miss your calendar notification? Don't worry we got you covered, watch the recording.
Managing devices is one thing, but how can we use that device management to align with our cloud security? Your cloud security posture should take a multifaceted approach, one of which should be device compliance. Learn the ins and outs of Microsoft Endpoint management device compliance policies, how to configure them and how they integrate with other cloud security tools such as Conditional Access and Microsoft Cloud App Security. During this session we'll not only demonstrate how to configure and apply compliance policies, but also how they impact your overall security posture.
Before cloud, management of devices was done using tools like Group Policy and Systems Center Configuration Manager. But as we move more and more into the cloud, how can do you make that transition to Microsoft Endpoint Manager? Join the Improving team to see first-hand how to leverage Configuration Policies in the cloud to control both your mobile devices and Windows desktops. Learn how to implement best practices for device configuration from the cloud as well as gain insights from our experience with the good, the bad and the ugly (and especially those 'gotchas') with cloud endpoint management.
The first step to establishing a strong endpoint management strategy is knowing what you have and where your vulnerabilities are. Did you know Microsoft Desktop Analytics exists? Further, did you know Microsoft lets you use it for free? In this session, we will take a deep dive into what Desktop Analytics is and why you should be using it. We'll also walk you through how to set it up in your environment so you can immediately start taking advantage of the insights it provides by showing you how to interpret Desktop Analytics reports.
2020 was not an easy year for most of us and with all the social challenges it brought, it also introduced a whole new chapter for cyber security. In preparation of our 2021 CSP webinar series topics, we'll start off with a round table panel discussion among some of our top technical consultants in the field to review the trends and patterns we saw in 2020 and our views on where everyone should be putting their attention in 2021. Join us in this open discussion to ask the tough questions that are impacting your business and get advice from our team on addressing those challenges.