Security Phase 2- Overview
Protecting devices that access company data is crucial for maintaining the security and integrity of an organization's information. Utilizing tools such as Microsoft Intune and Microsoft Defender for Endpoint can help ensure that devices are properly managed and protected against threats. Intune allows for the management of mobile devices and applications, while Microsoft Defender for Endpoint provides advanced threat protection and response capabilities. Together, these tools can help safeguard company data and prevent unauthorized access.
From an efficiency standpoint, Microsoft Intune can help automate device setup and management in several ways. Intune allows for centralized device management, which means that you can manage all of your organization's devices from a single, centralized location. This makes it easier to enforce policies and ensure compliance across all devices. Intune also supports Windows Autopilot, which simplifies the process of deploying new devices by allowing you to set a baseline setup for all new computers joined to Azure AD at first login. This means that new devices can be automatically configured with the necessary settings, applications, and policies, without the need for manual intervention.
What Security Controls Are Being Implemented in Phase 2?
Profile Migration + Enrollment
- Confirm devices are meeting baseline requirements
- Migrate profiles and join to Entra ID (AAD)
- Intune Enrollment
- Endpoint Encryption
- Computer MFA (Windows Hello for Business)
Endpoint Security Controls
- Endpoint Detection & Response
- Automated Investigation & Response
- Next Generation Antivirus
- Default Firewall Policies
- Web Content / DNS Filtering
- Endpoint Monitoring & Alerting
- Threat & Vulnerability Management
Device Access & Compliance Policies
- Bring your own device definition (BYOD)
- Block personal device access to company data
- Implement company policy that determines what device (computers or mobile) requirements must be met to access company data and block access if requirements aren't met
- App Protection Policies
- Require MFA for device enrollment
App Deployment & Management
- Automated App Deployment Profiles
- User / Device Grouping
- Windows Autopilot
- Remotely Wipe / Reset Devices
- Automate Policy Management
- Remove data from lost or stolen devices
Requirements
- Dedicated point of contact to answer questions timely and authorized to make decisions on security direction for your organization
- Already utilizing Microsoft 365 for email and Office apps
- Purchase Business Premium Licenses and assigning to appropriate users
- Security Phase 1 has been completed
- All devices are current and meeting baseline OS requirements
Implementation Process
Day 1
Initial Consultation
Our account management team will walk through the various security controls, discuss options, answer questions, and work with you to define the scope of the project.
Day 1
Technical Discovery & Planning
Our project team will dig through the various systems to determine the technical needs and build the project plan based on the defined scope.
Day 1
Client Review & Approval
We will prepare a Statement of Work for you to review and approve that will cover the implementation plan and associated project fees.
Day 1
Prepare Schedule & Educate End Users
We will provide you with an estimated project schedule and also provide emails to the end users that will let them know what changes to expect throughout the project.
Day 1
Implementation & Support
In accordance to all steps completed prior, we will implement the project plan and dedicate support resources to quickly address any issues that may arise.
Day 1
Closure & Documentation
We will confirm all steps have been completed to your and our satisfaction, update documentation for future support measures and prepare for future implementation of additional security controls.
How Will These Security Controls Affect End Users?
- Enroll in Windows Hello for Business on computer: After user signs in, the enrollment process begins. The user will be prompted to set up biometrics (if available) by default but if they won't be using biometrics then it will prompt them to create a PIN.
- Download app(s) on mobile devices: If the company policy will be requiring enrollment in Entra ID in order to access company data, the users will need to download the Company Portal app on their phones.
- Native Mail App: After app protection polices are created, only authorized apps can be used on a mobile device to access company data. The common scenario is any user that is currently using the built-in Mail app on their phone will need to download the Outlook app and set up their email in there instead as the built-in app will no longer work.
- Computer Access Requirements: If compliance policies are put in place, the following requirements need to be met in order to access company data from that computer:
- - Computers will need to be Entra ID joined
- - Microsoft Defender is installed and scans are clean
- - Computer is encrypted, has a secure boot, and has code integrity
- Mobile Device Access Requirements: If compliance policies are put in place, the following requirements need to be met in order to access company data from that mobile device:
- - Mobile devices will need to be registered in Entra ID/Intune
- - Microsoft Defender is installed
- - Mobile device is not rooted or jailbroken
- Web Filtering: Based upon what web filtering categories are blocked, end users may notice access to certain website may be blocked on any computer or mobile device that is enrolled in these policies
Frequently Asked Questions - Security Phase 2
Managing IT for small and medium sized businesses in St. Louis since 1985.




