We’re pleased to announce that our latest course, Getting Started with Trusted Endpoints, is now available on Level Up and MSP Level Up. We’ve gotten a lot of requests for more information on Trusted Endpoints, so we designed this offering to have a little something for everyone! This course works as a comprehensive introduction for folks new to deploying this feature, but also has new information available for administrators who already have some experience working with this feature.
By the end of this course, you’ll be able to:
- Explain how Trusted Endpoints establishes endpoint trust for:
- Windows and macOS devices using the Device Health application
- Android and iOS devices using Duo Mobile
- Describe the end-user authentication experience for Trusted Endpoints integrations
- Enable test mode on the Trusted Endpoints configuration page
- Identify best practices for a managed deployment of Trusted Endpoints
- Use the Endpoints page in the Duo Admin Panel to audit end-user activity, device health, troubleshoot access issues, and revoke access
- Locate resources for deploying and troubleshooting Trusted Endpoints
Even if you’re not currently on Duo Beyond edition, this course is open to administrators on all editions of Duo. We encourage you to register if you’re interested in learning more!
Have you heard that you can use the Device Health Application instead of endpoint certificates to enforce Trusted Endpoint policies for some integrations? It’s currently supported with Active Directory and Jamf pro, and we’ll be adding support for other device management tools soon!
I won’t go into all the details here (you’ll learn them in the course!). But this new certificate-less solution offers a better and more reliable Trusted Endpoints experience for you and your end-users authenticating from Windows and macOS devices. We want to set you up for success, so a large portion of this course focuses on how the Device Health Application verifies endpoint trust and highlights the key differences between the app and older, certificate-based deployments.