You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/react/docs/workshop-guidance/devices/RMD_166.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,10 @@ Zero Trust is a security model that assumes no user or device is trustworthy by
25
25
1.**Verify Explicitly**: Intune continuously verifies user identities and device health before granting elevated privileges.
26
26
2.**Use Least Privilege Access**: EPM enforces least privilege access by allowing users to perform specific tasks with elevated privileges without granting full admin rights.
27
27
3.**Assume Breach**: By limiting the scope and duration of elevated privileges, EPM reduces the potential impact of a security breach.
28
-
28
+
* * *
29
+
30
+
### **Video Walkthrough**
31
+
<iframewidth="560"height="315"src="https://www.youtube.com/embed/V5ZnUGbXg10?si=bjOnrK9m5FCpeeo8"title="YouTube video player"frameborder="0"allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"referrerpolicy="strict-origin-when-cross-origin"allowfullscreen></iframe>
0 commit comments