Implementing and Managing Microsoft Defender for Endpoint
This course will teach you to successfully deploy Microsoft Defender for Endpoint, perform advanced configuration, and fully manage the solution.
What you'll learn
In your organization today, you have a diverse set of endpoints that are being used. These entail different operating systems on PCs, servers, and mobile devices. Cybersecurity threats are rampant and span across all of these types of devices, and since your endpoints are keys into your organization network, it's imperative that these are protected. In this course, Implementing and Managing Microsoft Defender for Endpoint, you will learn to successfully plan, deploy, and manage Microsoft Defender for Endpoint. First, you will explore the various ways Microsoft Defender for Endpoint can be deployed and the advanced configuration options. Next, you will discover how to enforce enhanced protections using attack surface reduction rules. Finally, you will gain an overview on the types of threats that Microsoft Defender for Endpoint is able to mitigate against. When you are finished with this course, you will have the skills and knowledge of implementing and managing Microsoft Defender for Endpoint needed to fully deploy and manage it successfully.
Table of contents
- Module Introduction 2m
- Getting Started 3m
- Getting Started with the Configuration: Part 1 8m
- Getting Started with the Configuration: Part 2 4m
- Working with Roles and Permissions 2m
- Configuring Device Groups 5m
- Architecture and Deployment Methods 3m
- Endpoint Onboarding Process 7m
- Onboarding Using a Local Script 3m
- Onboarding Using a Group Policy 4m
- Defender for Endpoint Key Features 1m
- Vulnerability Management 5m
- Working with Vulernability Management 10m
- Attack Surface Reduction 6m
- Creating Attack Surface Reduction Policies 5m
- Next Generation Protection 2m
- Automated Investigation and Response 2m
- Working with Automated Investigation and Response 4m
- Module Summary 1m