JOE LURIE: Good morning. Good afternoon. Good evening, everyone. Thanks so much for joining
us. My name is, Joe Lurie. I'm a product manager with Microsoft 365. I focus on deployment and management. I've got about 20 years
of experience with IT, all of it in deployment and management. And my experience with
Configuration Manager goes as far back as SMS 2.0
and every version ever since. I am here today with my
friend and colleague, Mayunk. Mayunk, won't you tell us a
little bit about yourself? MAYUNK JAIN: Thanks, Joe. So, hello everyone. My
name is, Mayunk Jain, and I'm a senior product
manager for Microsoft 365 based out of Redmond in the US. Today, we are excited to
talk about getting started with Microsoft Endpoint Manager, and we look forward to a
great session with you. JOE LURIE: Thanks, Mayunk. So, everybody, normally at sessions like this, I start off with some surveys. How many of you are now
managing your mobile devices? Just raise your hand. How many of you understand co-management? Just raise your hands. I can't do that today. You're not here with me. So, I'm going to make some assumptions as to why you're here and probably some of the
questions that are swirling around in your mind, like, are you having to support
a whole new class of users? Those users that use the
desktop at work and are using their mobile devices or even
their own personal laptops at home. Or, are you new to modern management? If you're new to modern
management and you want to know how Endpoint Manager can help,
you're in the right session. In fact, you probably
already own those licenses that you need. And, Mayunk will talk about
that in just a little while. Are you curious about
co-management, about tenant attach, or even about some of our new services, like Endpoint Analytics? We're going to dig into those topics. We'll dig into those terms,
and we'll show you how you can help your organization, help your employees stay
secure, stay productive, especially in these
economically uncertain times, when devices may or may
not be on premises anymore. The new Endpoint Analytics
is really going to help you with that. And again, we'll
talk about that later on today, and help you gain visibility and insights into those devices. So, really, let's just jump right in. In this session, we'll be showing you what is Microsoft Endpoint Manager? This is a product that
we introduced you all to a little less than a year ago. So, Mayunk and I are going
to shed some clarity on what is Endpoint Manager. And then, we'll talk to you
about Configuration Manager and Tenant attach. We'll talk
to you about co-management. Don't worry, it's not all talking: We're going to demo a whole
bunch of stuff, as well. And you'll see some of those
benefits that you're going to realize immediately. We'll talk to you about
how to get those devices into your users' hands
in the most efficient way and make sure that they're
secure right out of the box. With our zero-touch provisioning partners, this is all possible. Finally, you'll hear
about how Endpoint Manager can help with your zero-trust security and those secure strategies with some of our new analytics offerings. Mayunk, why don't you go
ahead and start talking about Microsoft Endpoint Manager? MAYUNK JAIN: Thanks, Joe. So, Microsoft Endpoint Manager
combines Microsoft Intune and Configuration Manager
into a single platform. And it's available as part
of the Enterprise Mobility and Security License. It provides the endpoint and
security management plane to the Microsoft 365 solution stack. Many of you know Configuration Manager, or what used to be called System Center Configuration Manager, as the management tool for deploying and managing your on-premises Windows devices. And many of you known Microsoft Intune as the management tool
to deploy and manage the mobile devices, and the cloud-managed Windows 10 devices. In November 2019, we introduced Microsoft Endpoint Manager, with the goal of making it simple for you to take advantage of modern management by bringing together
Configuration Manager and Intune into a single unified
endpoint management solution. The new Tenant attach
capabilities in Endpoint Manager provide maybe one of
the most flexible ways for Configuration Manager
customers to start gaining cloud benefits without necessarily
enrolling their Windows clients with Intune or the cloud. All you need to do is connect your Configuration Manager site to your cloud tenant, and
a host of remote actions and analytics immediately
become available to you. Some organizations may stay in this phase of modern management for a long time, and that is completely OK. Because, you see, we see modern management as a spectrum and have designed this
platform to serve organizations that are at different
levels of tech intensity. So, organizations that are
ready for the next step can use what we call
co-management to manage Windows using both Configuration
Manager and Intune at the same time. This has seen a tremendous
explosion in usage recently, as organizations discover
that this gives them a unique advantage in quickly
enabling remote workers and remote users by dealing
with all the additional challenges and uncertainty
around us right now. Again, customers can stay in any one or a combination of these
spots for as long as they like because modern management
is not a destination, but a methodology. For new customers or new endpoints, we do recommend going to the
cloud directly with Intune, and then existing customers can gradually move more workloads to
the cloud over time. So, a little later, Joe
is going to talk to you about what exactly is
co-management and why it is a unique, low-risk
approach to transition fully to the cloud, over time, at your own pace. Our customer guidance
is to meet the customers where they are. And let's be clear: Co-management is a great place to be. For some customers, that is
their journey's destination. We embrace that, and we
encourage you to do so, as well. Microsoft has been
recognized as a leader in unified endpoint management
by all major analysts, such as Gartner, Forrester, and IDC. In the latest report
for 2020 that released a few days ago, Gartner said, with the establishment of Microsoft Endpoint Manager, Microsoft offers the most
used UEM tool on the market, with significantly more
devices under management than its competition. The links to these third-party
reports are available on our website or upon request from your Microsoft representative. So, with that, why don't
you take it away, Joe? JOE LURIE: Thanks, Mayunk. And
everyone, as Mayunk mentioned a few minutes ago, Microsoft Endpoint Manager
really is that marriage of Configuration Manager and Intune. And this is a connection
that we've seen before and many of you have done before. You've already connected
your Active Directory to your Azure AD. You've connected Exchange
and Exchange Online, and SharePoint and SharePoint Online. And so, now, connecting that
endpoint management solution, Configuration Manager,
to Microsoft Intune, it just makes sense. So, what we're doing when we do that is we are taking all the
abilities or all the devices that are currently managed on premises. We're moving those into the cloud while they may still
be managed on premises. And we'll show you what we mean by that. As a slide in front of you says, "Connect what you have today." And, this is something that
many of you have started, again, many years ago. Now, when we talk about this, I'm actually going to show
you this in just a minute. When you talk about connecting it, your Configuration Manager
admins may or may not be Azure Global admins. So, you
might need some help with that. But when you attach
Configuration Manager to Intune, that process that we call "Tenant attach" is that first step. It's fast, it's easy,
and it's fairly low risk. You have, you gain immediate value, such as DLP, or "data loss protection." You gain conditional access once you do that connection to all those devices that
are traditionally managed by Configuration Manager. But, again, at this point, until
you start moving workloads, your PCs are continuing to be managed by Configuration Manager. Then, once a tenant is attached, you have the option to
move selective workloads to cloud management. For instance, you can move Office Click-to-Run and Windows updates from Configuration
Manager over to Intune while leaving endpoint protection to have Configuration Manager
be that management authority. You can even start
piloting things in Intune, piloting those workloads. So, some of your devices
are being managed in Intune while others are still being managed in Configuration Manager. Mayunk called this low
risk, because it truly is. Once you've..., if you decide that for whatever reason you want to take those workloads that you've moved over to
Intune and bring them back to Configuration Manager while you work on some of
your policies and settings, you can do that with
an easy click, as well. Mayunk, I mentioned earlier
that you're going to talk about licensing. Can you bring us up to speed on what that licensing means? We've had a lot of questions about that. MAYUNK JAIN: Sure thing, Joe. I did want to quickly
remind folks about the new co-management licensing entitlement. So, the co-management licensing
lets Configuration Manager customers with Software
Assurance get into PC management without having to purchase
and assign individual Intune licenses to users. So, this license makes it
easier for you to start your co-management journey and
manage Windows devices with Endpoint Manager. If you happen to own
the user subscriptions for EMS E3 or Microsoft 365 E3 or higher, you always have these entitlements. But with all things licensing, make sure to check out the
FAQ and the product terms to dig into the fine print. And with that, let me
show you a quick demo. So, let me show you what this looks like. So, we log in to our
Configuration Manager console, and we go to the Administration node and launch the Co-management Wizard. In the wizard, you'll now
notice there is an option to upload the Configuration Manager data to the Microsoft Endpoint admin center. When you choose this, management
of all your Windows clients remains on premises. This step, that we call "Tenant attach," only synchronizes your
Configuration Manager site with your cloud tenant. You can perform some remote actions on your on-premises clients without moving them to
the cloud at this point. So, now you can stay
here, or you can continue to complete the co-management
of your clients, if that's what you want. It's an optional step. So, you do that, and here, you'll notice in the confirmation dialog
that all your policy and Configuration Manager
workloads are still going through Configuration Manager. When you do this, this is when your Windows
clients start to be managed by both Configuration Manager
and Intune at the same time. JOE LURIE: Mayunk, I
was just going to say, you may need to get some help
from your Azure Global admins. And this is where you
would need that help. You see that Sign in button there, have them sign in or work with them to make sure that Tenant
attach can actually happen. MAYUNK JAIN: That's right, Joe. But as you'll notice, after you're done with this, in the confirmation dialog, all your policies and
configuration workloads are still going through
Configuration Manager. So, even after you enable co-management, you will stay in complete control of what workloads you want to
move to the cloud and when. JOE LURIE: All right. Thanks, Mayunk. So, as you can all see,
what we've done is, again, we're under Administration\Cloud
services\Co-management, and Mayunk has just walked us through that Co-management Wizard. Now, I have the Properties
open, and I have it open cause it does take seven
or eight seconds to open once you right-click
and click "Properties." And I didn't want to
waste your time on that. So, I've already opened it ahead of time. So, you can see these settings. You can see, like, the Azure environment, you can see that my devices are being managed by
Microsoft Endpoint Manager and whether or not I want to
enable Endpoint Analytics. You can see more enablement. Do I want to automatically
enroll Intune? Yes or no. Just a pilot. If it's just a pilot, I can browse through that collection. It's the workloads that
actually really bring the meat to this. And there's
the workloads where I can say, I want compliance policies
to move over to Intune. I want endpoint protection
to move over to Intune, and that includes things
like Microsoft BitLocker. Client apps? I'm going to go ahead
and pilot that in Intune. And what you'll notice when I..., and this is stuff that
we can do right in that original wizard, or I
can do it after the fact, which means, I can always
come back to the Properties and start moving in new workload. You'll notice in the staging, my compliance policies are
already being managed by Intune. So, I can't really
browse for a collection, but I can in Client apps. Rob York has a fantastic
session on this, as well. So, make sure you do, really
get to the meat of it. You're going to want
to visit Rob's session. And don't forget, once I've done this, and we've talked about this, if I decide for whatever reason
I want endpoint protection to actually stay with
Configuration Manager for a while, again, it's just sliding it
all the way back down. All right. So, that's the Tenant attach and that's co-management and, again, we have a lot of great info on that, so make sure you check it out. I want to start moving
into shifting our focus over to zero-touch provisioning. One thing that we mentioned
is zero-touch provisioning really means, getting that
device to the user's hands, without IT having to touch it first and making sure that it's secure and the user's productive
right out of the box. We've heard from customers repeatedly that Windows Autopilot allows
the users to work remote. It allows them to get that
device while they're traveling, perhaps, at a hotel, or if
their device is lost or stolen, an easy way for them to
get a brand-new device and get it provisioned and
secure right out of the box. We introduced Autopilot
in 2017, July-ish 2017. And, we introduced it at
first to really help you help your customers or help your end users get that device that much quicker without spending too
much time on it yourself. For example, when, if,
how many of you, again, raise your hand, how many of you are responsible
for your gold images? I know I was at my job
before joining Microsoft. And how often did you have
to create that gold image? Did you update that gold image? Did you add quarterly patches?
Did you add applications? Remove applications? Did you send that gold
image over to the OEM vendor so they can worry about putting that image on the devices before sending them? All that time, all that money, just wasted, spent.
Because Windows 10 comes, a device comes with
Windows 10 already on it. And what we're effectively
doing is removing it for our own Windows 10 version. Michael Niehaus and Ms.
Rahman have a great session on Autopilot coming up later. So, I'm not going to spend
too much time about that. I just want to talk about
the zero-touch provisioning. So, when we talk about that, we're not only talking
about Windows Autopilot, we're talking about all
devices that can be shipped from an OEM directly to the end user while the user is secure and productive. And so, it's not limited to
Windows Autopilot at all. All of our partners-Apple,
Android, Samsung- they all have zero-touch provisioning, and they're all integrated
with Endpoint Manager. So, I want to shift focus one more time over to security. And,
Mayunk is going to walk you through security. But remember, you want to check
out that Autopilot session. There's one on managing Windows devices and it's fantastic. And you'll hear from the rockstar, Michael Niehaus, himself. Mayunk? MAYUNK JAIN: Thanks, Joe. So, we often hear
customers say that security is the why they chose us,
while cloud management is the how. So, in addition to you
define the platform, Microsoft continues to invest
in improving the end-user and IT admin experience; integrating with endpoint
security and identity systems; and expanded use of analytics,
AI, and machine learning. So, let's start with endpoint security. You can take two approaches to
endpoint security management with Endpoint Manager. You can employ mobile
device management, or "MDM," to manage all aspects of the device. Or, you can only manage
select applications running on the device, using an approach called my
"mobile application management," or "MAM." MDM requires that the
user enroll their device with the organization and
allows for greater control of the device. All of our aspects,
such as disc encryption, the camera being turned on or off, the network connectivity,
the certificates, and so much more. But where user privacy
is a higher priority or the company doesn't own the device, MAM, or application management, makes it possible to apply
the security controls at the app level. And these are, these could be on nonenrolled devices
or enrolled devices. So, this way, the organization can ensure that users can only use apps that comply with their security controls to access emails and Teams chats or files or even to browse the web. But in both cases, once
you grant data access, you can control what the user
does with the data afterwards. For example, they cannot copy and
paste from corporate apps to personal apps or save
data to untrusted locations. So, they cannot store data to, say, their local disk or share via another app. They can only move data
within trusted apps, such as, between Microsoft
365 Apps, Adobe Acrobat, or a whole bunch of partner
apps that integrate with Endpoint Manager. You can enforce that
people save their data to trusted locations, such as OneDrive. So you don't have your
intellectual property just lying around on a mobile device or a home device somewhere. And in case of a malware
or any other security risk, the app or device is
automatically isolated from the rest of the network. The bottom line is that
you can explicitly verify and enable access to
trusted and compliant apps on managed or unmanaged
devices for an end-to-end zero-trust security. At a high level, Endpoint
Manager helps people work from any device while
ensuring only trusted devices and apps can access work data. So, depending upon the ownership model, you could apply device-level
or app-level controls to balance this user
privacy and security needs of the organization. With the new Microsoft Tunnel app, you can now enable secure access
to your internet resources from mobile devices. Lance Crandall goes into a
lot of details in his session, and I encourage you to
watch it in the video hub. Microsoft is uniquely
positioned to leverage the global cloud scale, the trillions of signals and
the deep expertise that we have to remediate and protect against device and app vulnerabilities without disrupting the end-user experience. And I think that is really key for successful adoption and
rollout of these services. This solution offers the
key tools to tie together. On one hand, that's
obviously driven access because modern microsegmentation
requires that we get access beyond networks, based
on the role, the location, behavior patterns, device
security, and much more. Ensuring that all the
policy is automatically enforced at the time of access, and then continuously
throughout the session, where possible, is key. The other aspect is automated
threat detection and response. Telemetry from the systems must
be processed and acted upon automatically. Attacks today
happen at the speed of cloud. Your defense system must
also act at cloud speed to protect you. Microsoft security integrates
this intelligence with policy-based responses
for real-time protection. Microsoft's approach to zero trust extends throughout the entire digital estate. It serves as an integrated
security philosophy and end to end strategy. You will find deep-dive
sessions in our learning path to learn more about
implementing zero-trust controls across the six foundational elements, including verifying identities, verifying devices, protecting
data, hardening applications, protecting infrastructure,
and governing networks. Devices are one of the
foundational elements of a holistic approach to
zero-trust security control. That's where the data lives
after the user has accessed it. Devices can easily become
the weakest link unless you enforce your security
policies consistently and reliably not only on the device itself but also to the apps that run on it. Far too many security
breaches occur due to issues as obvious as an outdated
or missed security patch or a poorly configured app. If a device does not meet
the security patch level set by the administrator, the user will be prompted
to update the device before granting access. Again, I encourage you to
check out other sessions, such as those by Matt Shadbolt and Dilip Radhakrishnan, who dig deeper into the
endpoint security story, as well as sessions in
the zero-trust track, if that's of interest to you. With that, let's take a look
at how it all comes together in the admin center with a quick demo. So, this is a Microsoft
Endpoint Manager admin center, which is a new home for Intune as well as all of the new capabilities
that we introduced as part of Endpoint Manager. It's available at endpoint.microsoft.com. And personally, I feel this is such a huge
improvement in terms of the admin experience
and the user experience for configuring your security policies, your configurations quickly. So, it drops you into this home page. There's a dashboard in which
you can get a quick look at all your devices that you're managing and their security compliance status. But, what I really
wanted to point out today is this new Endpoint security node. This is a new node which
provides several advantages, in my opinion. The first is, it consolidates all the security-related configurations and policies in one place, unlike the previous experience. Secondly, it helps streamline the
security and IT operations in your organization and
optimizes the time to respond to security vulnerabilities. Remember, we spoke
about the speed of cloud when it comes to attacks
and response nowadays. And finally, it is the hub that unifies the endpoint security management
across Microsoft security, saving you the hassle of
jumping between consoles. Let me show you what I
mean by all three of these. You can already see here the first one, which is consolidation of your antivirus, your firewall, disk encryption,
of your conditional access- everything in one place. For example, if you wanted to configure
your disk encryption, you could go in here, and
you can create a policy not just for your Windows platforms BitLocker management, but also with macOS, with FileVault. So, you get all of it in one place. Similarly, if you wanted
to do conditional access, you could. This functionality itself is powered by Azure Active Directory,
as you can see here, but you don't have to necessarily go to the Azure Active Directory
console to manage it. Everything that you can do
there, you can do right here. Again, saving you time
and the hassle of jumping between consoles. You have all of the same options, the parameters, everything here. So, that's how you can start to get some of that consolidation
in your security policy. The other one I spoke about is to streamline the IT
and security operations. What we have learned
from customers is that many of them have a dedicated role that is responsible for deploying the security policies for the endpoints, but they're not really about, they don't have to deploy
the device themselves or update the device, update the applications and so on. So, that job typically
belongs to an IT pro sort of an admin. So, what this node gives
you is a role-based access control way of giving
access to the security part, to your security counterparts,
without having to..., while having clear roles
and responsibilities across the rest of the console. And finally, talking about unifying the different aspects of
security, Microsoft security, you will notice here that we've
got Microsoft Defender ATP, which is tightly integrated
with this experience. So, you can onboard your devices
for Microsoft Defender ATP on different platforms,
including Windows and Android. You can do the management from here. In many cases, you might not have to
go to the other console, but if you did want to go
to the Defender ATP console, you can just click
through, and you can switch to the other console directly
from this console itself, which gives you a huge advantage there. The other ways that we
have of integrating it is security baselines. So, nowadays security is not
just about knowing what to do, but we give you guidance
through the security baselines of what are the recommended
configurations for security based on our learnings from our customers, from the cloud, and from security experts. So, we have security
baselines for Windows 10, for Defender ATP, and
even for Microsoft Edge. And in future, we are working on security
baselines for things like Office 365 and other services. So, this really helps you
start to bring together all of the different
aspects of the network, of the device estate that you
are responsible to secure. So, with that, I just wanted to, again, mention how endpoint security
plays such a big role on top of the device management and app management that
you use this product for. Now, let's look at what's
new in analytics, Joe. JOE LURIE: Thanks, Mayunk. The Security node within
the endpoint.microsoft.com. It's fantastic. And it really
shows all those insights and, in some cases, remediations, as well, on anything that's
happening to your devices. And when we talk about insight, we talk about what's going on and any kind of possible remediations or necessary mediations, that's where analytics actually comes in. And we have a lot of analytics
that are being worked on, that we're adding to, and some that are existing-things
like Desktop Analytics that we introduced last year. Desktop Analytics lets you see, OK, I have a Windows 7 device. I have one. How many of you have Windows 7 devices? So, I have a Windows 7 device, and I want to make sure that
the hardware on this device, I want to make sure the
applications on this device are upgradable to the newest
version of Windows 10. Or, I have a Windows 10 device running, maybe, version 1709 or version 1809 and I want to see if it's compatible
with everything required for Windows 10 version 2004. So, Desktop Analytics gives
you that kind of insight. It gives you, it says, Yes,
all these apps are supported or they work with Windows 10. These should be upgradable.
This one may not or this driver doesn't work. So, you may want to uninstall the driver and reinstall it after the fact, which actually is one of the remediations. So, besides the Desktop Analytics, we're introducing Productivity Score. Productivity Score mostly
works with things like our Office apps and with
SharePoint and with OneDrive and even with Yammer. And it really shows how productive your users are, how collaborative they are, based in..., and really, it shows you how
they're doing their work. That itself, is broken into
Employee Experience Score, and it's broken into the
Technology Experience Score, which might look at any kind
of network interruptions. We have Endpoint Analytics.
Endpoint Analytics is one of our newer
analytics offerings, as well. Again, each one of these
gives you visibility, they give you insight, and then they give you some actions. Mayunk is going to go
ahead, he's already has his web browser open. He's jumping at the bit to show
you some Productivity Score and Endpoint Analytics,
to show you that console. So, go ahead, Mayunk. MAYUNK JAIN: You're right about that, Joe. Let's get into our last
demos set for today. So, as you can see, I have the
Productivity Score open here. This is one of our newest services. It's already super popular. I think we crossed something
like 2 million devices in this service a few days ago, and it's probably a higher number now. So, Productivity Score is really the part which helps you to transform how work gets
done in your organization and really see whether
and how people are using the technologies that you're
making available to them. So, you've got a few tiles here. You've got the tiles on Communication, Content collaboration, and Mobility. What... So, pardon the numbers here. You don't really... I mean it's a demo, I don't
actually have any users using it. So, the score is zero, but as you start to use this, you will start to see your
score in conjunction with your peer benchmark, which is other companies
that are like yours, and how you can improve. That's what you will start seeing here, some recommendations on how
you can improve the score. When you talk about these
different aspects, communication. So, if you click into
that tile, you can see, how are people communicating nowadays. For example, are they
still sharing files around, or are they using chat more than email? Are they using some of
the newer technologies that you've made available to them? So, here you can see how people
are using your technologies, whether they're sharing
files as attachments, which we know has led
to multiple versioning, or it just leads to a
lot of delay or conflict while working together on a file. Or, are they using the shared capabilities of collaboration that
Microsoft 365 makes possible? So, this just raises
the overall productivity of your organization. And then, of course, on Mobility. That's one of the key
areas where you want to see people getting work done not
just on their Windows devices or their Macs but on any device. And Office 365 with
Outlook and Teams and... We have all of our apps now
available on mobile devices. So, that's a great way
to see that, as well. And that brings me to this
other part of Productivity Score which we call Endpoint Analytics. And that is available to you in the Microsoft Endpoint Manager
admin center under Reports. So, this is currently in preview, but it's available to all of
you to try out right away. Let me adjust the zoom here a little bit so you can see the whole screen. So, you have more detailed
sessions that we go into the details of this. So we
have Shilpi and A.J. Smith doing that session on Productivity Score. You've got Brian Taylor doing a session on Endpoint Analytics. So, do check out those videos. But what I really wanted
to show you quickly is what this looks like because we've been talking
a lot about these insights and analytics. So, what Endpoint Analytics
does is it helps you with the relative measure
of the time it takes your machines to boot up,
for your users to sign in, and the health of your devices,
the health of your network. So, in the middle here,
you see the score-again, your own score versus a
baseline of your peers. You see insights and
recommendations on to the right of that page, where you can see what are
some of the things you can do to further improve your
experience. For example, it says here that 83% of
the Windows 10 devices are not currently using Autopilot, but if you did use Autopilot, then your score would
jump by, say, six points because it would just make provisioning and updating machines faster. Or, 33% of devices are not enrolled in Azure Active Directory. And if you did move to
Azure Active Directory, that would boost your score
by a few points over there. And then you can go into more details. You can start looking at
the startup performance of the different devices you have. You can compare the different
models in your organization to identify which models are
doing better than others, which devices are doing
better than others, what processes are maybe
causing some of the slowness in startup and so on. And then, we have Proactive Remediations, which is a really powerful feature which helps you to proactively remediate some of the common issues that can happen. And this is important, now more than ever, because employees are no
longer in the offices. Most of us are now scattered
yet we are working remotely, and there is no help desk
that we can just walk up to to get a minor thing fixed. So, having a solution like this
really helps you bring down the cost of maintaining a help
desk and just the sheer load on the help desk. Apart from the fact that end
users can get their problems solved very quickly, before they even feel them or before they even see them happening. So, that's one of the things
that I wanted to check out when you go back and see, and
find analytics on your own. So, that's Endpoint Analytics, and we hope you have fun using it when you go back home
and try it on your own. So, with that, Joe, take us home. JOE LURIE: Thanks, Mayunk. And thanks so much for your help today. And thanks everyone for sticking with us. We took you through a long path. We took you through
zero-touch provisioning, and security, and some of our analytics offerings, and really about MEM,
about that Tenant attach, and that co-management
of Configuration Manager and Intune. Wherever
you are in that journey, wherever you are, whether you're still
thinking about cloud attach, whether you're in the
middle of cloud attach, Microsoft Endpoint Manager
really is that hub for you. Within that hub, we can help
you with your Mac, your iOS, Windows devices, your Android devices. We can help manage them, we can help protect the
applications that live on them. And because we use such
a powerful data set, so many signals that come from
so many different devices, we have all that intelligence, as well. We deliver the analytics
to keep you ahead of change so you can keep your cost down. So, again, thanks so much for joining us in this introduction, "Getting started with
Microsoft Endpoint Manager." We have dozens of videos, dozens of sessions available
from subject matter experts, from our product group,
and so much more learning even after those. You can find all that information at aka.ms/MicrosoftIgnite2020/MEM. Thanks so much, everyone.