Managing Modern Desktops: Endpoint Protection

Windows    |    Intermediate
  • 19 videos | 2h 8m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 9 users Rating 4.3 of 9 users (9)
In modern enterprise environments, organizations need to be proactive and prepare for unforeseen circumstances, perform detection, and assemble automatic investigation and mitigation strategies. Fortunately, IT professionals can rely on robust tools like the kind found in Microsoft 365 environments. Through this course, learn about endpoint protection in Microsoft 365 environments. Explore endpoint security, manage security baselines and policies, and work with firewall and attack surface reduction policies. Next, examine account protection policies, encrypted disk security, antivirus policies, endpoint detection, and response policies. Finally, learn about firewall rule management and how to configure Microsoft Defender for Endpoint, monitor devices, and investigate and respond to threats. This course is part of a series preparing learners for the MD-101: Managing Modern Desktop exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify options for endpoint security planning
    Outline security baselines and how they're used to manage devices with intune
    Manage security baselines using intune
    Outline endpoint security policies and how they're used in intune
    Work with firewall application policies and recognize how they can be implemented using intune
    Implement firewall traffic rules using intune
    Use attack service reduction policies and recognize how they're used in intune
    Work with account protection policies in intune
    Identify disk encryption policies and how they can be implemented using intune
  • Manage bitlocker and filevault policies and recognize how to monitor disk encryption
    Manage antivirus policies using intune
    Outline microsoft defender for endpoint
    Configure microsoft defender for endpoint
    Implement microsoft defender for endpoint on android devices
    Monitor devices when integrating microsoft defender for endpoint with intune
    Recognize how to investigate and respond to threats
    Manage incidents using microsoft 365 defender
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 4s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 57s
    After completing this video, you will be able to identify options for endpoint security planning. FREE ACCESS
  • Locked
    3.  Intune Security Baselines
    8m 46s
    Upon completion of this video, you will be able to outline security baselines and how they're used to manage devices with Intune. FREE ACCESS
  • Locked
    4.  Managing Intune Security Baselines
    9m 36s
    In this video, find out how to manage security baselines using Intune. FREE ACCESS
  • Locked
    5.  Intune Endpoint Security Policies
    5m 30s
    In this video, we will outline endpoint security policies and how they're used in Intune. FREE ACCESS
  • Locked
    6.  Working with Microsoft Defender Firewall
    7m 2s
    During this video, you will learn how to work with firewall application policies and recognize how they can be implemented using Intune. FREE ACCESS
  • Locked
    7.  Implementing Microsoft Defender Firewall Rules
    5m 53s
    In this video, discover how to implement firewall traffic rules using Intune. FREE ACCESS
  • Locked
    8.  Using Attack Surface Reduction Policies
    11m 53s
    Find out how to use attack service reduction policies and recognize how they're used in Intune. FREE ACCESS
  • Locked
    9.  Working with Account Protection Policies
    10m 7s
    In this video, you will learn how to work with account protection policies in Intune. FREE ACCESS
  • Locked
    10.  Intune Endpoint Security Disk Encryption Policies
    4m 49s
    After completing this video, you will be able to identify disk encryption policies and how they can be implemented using Intune. FREE ACCESS
  • Locked
    11.  Securing Encrypted Disks
    4m 24s
    Discover how to manage BitLocker and FileVault policies and recognize how to monitor disk encryption. FREE ACCESS
  • Locked
    12.  Managing Antivirus Policies
    7m 6s
    In this video, find out how to manage antivirus policies using Intune. FREE ACCESS
  • Locked
    13.  Microsoft Defender for Endpoint
    5m 24s
    Upon completion of this video, you will be able to outline Microsoft Defender for Endpoint. FREE ACCESS
  • Locked
    14.  Configuring Microsoft Defender for Endpoint
    15m 6s
    Learn how to configure Microsoft Defender for Endpoint. FREE ACCESS
  • Locked
    15.  Implementing Endpoint Protection for Android Devices
    8m 9s
    During this video, discover how to implement Microsoft Defender for Endpoint on Android devices. FREE ACCESS
  • Locked
    16.  Monitoring Devices with Endpoint Manager
    3m 38s
    Find out how to monitor devices when integrating Microsoft Defender for Endpoint with Intune. FREE ACCESS
  • Locked
    17.  Investigate and Respond to Threats
    6m 15s
    After completing this video, you will be able to recognize how to investigate and respond to threats. FREE ACCESS
  • Locked
    18.  Managing Incidents with Microsoft 365 Defender
    8m 53s
    In this video, you will learn how to manage incidents using Microsoft 365 Defender. FREE ACCESS
  • Locked
    19.  Course Summary
    57s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 13 users Rating 4.6 of 13 users (13)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 14 users Rating 4.4 of 14 users (14)
Rating 4.5 of 35 users Rating 4.5 of 35 users (35)
Rating 4.9 of 14 users Rating 4.9 of 14 users (14)