Modern Endpoint Management

Malicious actors don't keep a nine-to-five schedule and are continuously trying to find new ways to breach through one's security. Although Microsoft is responsible for securing their datacenters and services within, a customer is still responsible for securing their own environment. A compromised endpoint has a near instant access to valuable company data. Keeping endpoint up-to-date, deliver the business applications, keep the user productive on their device, while enforcing security creates various challenges for IT departments.

What will you learn? 


By leveraging Microsoft's solutions, you gain access to a wide array of capabilities, fueled by Microsoft's expertise and billions of 'signals' from across the world. By intelligently leveraging that information through various cloud services, you significantly increase your security posture, reduce your attack service and increase the speed of delivery for applications and end-user devices.


  • Modern Desktop deployment and preparations
  • Enpoint Manager Introduction
  • Compliance: what and how
  • Condition Access Policies
  • Risk-based Conditional Access
  • Configuration Policies
  • Endpoint Security
  • Microsoft Defender for Endpoint
  • Application Management and Deployment
  • Windows Update Manager
  • Windows Autopilot
  • Privileged Identity Management
  • Microsoft Defender for Cloud Apps

Course on demand

Address info