MS-102: Managing Endpoint Protection Using Microsoft Defender for Endpoint

Microsoft 365    |    Expert
  • 4 videos | 57m 48s
  • Includes Assessment
  • Earns a Badge
In this course, you will discover the key capabilities and features of Microsoft Defender for Endpoint, a critical tool for ensuring the security of your organization's digital infrastructure. You will explore several onboarding procedures for Microsoft Defender for Endpoint to help seamlessly integrate various devices. Then you will focus on the different Endpoint settings in the Microsoft 365 Defender interface. Finally, you will investigate how to detect and respond to potential vulnerabilities using the appropriate Microsoft 365 Defender interfaces. This course is part of a series that prepares learners for the MS-102: Microsoft 365 Administrator certification exam.

WHAT YOU WILL LEARN

  • Recall key capabilities of microsoft defender for endpoint
    recognize key capabilities of microsoft defender for endpoint
    Recall various options for onboarding devices into microsoft defender for endpoint
    exercise various options for onboarding devices into microsoft defender for endpoint
  • Describe the various endpoint settings found in the microsoft 365 defender interface
    explain the various endpoint settings found in the microsoft 365 defender interface
    Use the appropriate interfaces in microsoft 365 defender to check for endpoint vulnerabilities in your client software and respond to identified breaches and risks
    utilize the appropriate interfaces in microsoft 365 defender to check for endpoint vulnerabilities in your client software and respond to identified breaches and risks

IN THIS COURSE

  • Locked
    1.  Introducing Microsoft Defender for Endpoint
    13m 22s
    Upon completion of this video, you will be able to recall key capabilities of Microsoft Defender for Endpoint. FREE ACCESS
  • Locked
    2.  Onboard Devices to Defender for Endpoint
    16m 53s
    After completing this video, you will be able to recall various options for onboarding devices into Microsoft Defender for Endpoint. FREE ACCESS
  • Locked
    3.  Configure Defender for Endpoint Settings
    12m 54s
    In this video, we will describe the various Endpoint settings found in the Microsoft 365 Defender interface. FREE ACCESS
  • Locked
    4.  Respond to Endpoint Vulnerabilities
    14m 40s
    During this video, discover how to use the appropriate interfaces in Microsoft 365 Defender to check for endpoint vulnerabilities in your client software and respond to identified breaches and risks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.5 of 119 users Rating 4.5 of 119 users (119)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)