by Jason Rutherford | Mar 30, 2022 | Endpoint Management, Unified Endpoint Management
Estimated Reading Time: 5 minutesWelcome to Model’s approach to Unified Endpoint Management Application Management Level 5. This is part of the Maturity Model series on Unified Endpoint Management. Today’s post will cover: A definition of Unified Endpoint...
by William Bracken | Feb 15, 2022 | Endpoint Management, Patch Management, Power BI, Unified Endpoint Management
Estimated Reading Time: 6 minutesMicrosoft’s endpoint management software is some of the most-powerful on the marketplace. We here at Model have dedicated our careers to understanding and leveraging this powerful software to the benefit of the clients who use it...
by Jason Rutherford | Feb 8, 2022 | Active Directory, Azure, Cyber Security, Endpoint Management, Microsoft Defender, Microsoft Intune, Patch Management, Unified Endpoint Management
Estimated Reading Time: 7 minutesThis post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5. In this post you’ll read about: What is Unified Endpoint Management (UEM)? Our...
by William Bracken | Jan 4, 2022 | Case Studies, Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management
Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
by Jesse Walter | Dec 9, 2021 | Cyber Security, Endpoint Management
Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...