Skip to content

Commit 3ed4bfa

Browse files
authored
Added video for Github page (#812)
1 parent 71013ff commit 3ed4bfa

File tree

1 file changed

+4
-0
lines changed
  • src/react/docs/workshop-guidance/devices

1 file changed

+4
-0
lines changed

src/react/docs/workshop-guidance/devices/RMD_121.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ When you create a device configuration profile, you have two policy types: Templ
1212
* Templates include a logical grouping of settings that configure a feature or concept, like email, kiosk devices, and device firmware.
1313

1414
Use the Endpoint Security node to configure device security and to manage security tasks for devices when those devices are at risk. The Endpoint security policies are designed to help you focus on the security of your devices and mitigate risk. The available tasks can help you identify at-risk devices, to remediate those devices, and restore them to a compliant or more secure state.
15+
* * *
16+
17+
### **Video Walkthrough**
18+
<iframe width="560" height="315" src="https://www.youtube.com/embed/Ynu0wECs4bM?si=AB2UqkZs2vMrBJSM" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
1519

1620
## Reference
1721
* [Device Configuration](https://learn.microsoft.com/en-us/mem/intune/configuration/device-profiles)

0 commit comments

Comments
 (0)