Intune Deployment: Configured policies for device enrolment, access control, security settings (encryption, passwords), and application whitelisting/blacklisting. Created custom configuration profiles for different device types (Windows, Android). Defender for Endpoint Integration: Enabled real-time threat detection and prevention across all devices. Configured vulnerability management to identify and patch security weaknesses. Established centralised reporting and dashboards for threat monitoring and incident response.