Device protection with Endpoint Manager and for Endpoint

Duration: 3 Days [Remote / Onsite] WorkshopPLUS Difficulty Level: 300 - Advanced

Description Methodology

This offering presents the fundamental security Learn by example components and features of any Microsoft Endpoint Participate in group discussions and learn from Configuration Manager environment, such as RBAC or presentations and demonstrations. role-based administration, Endpoint Protection​, Exploit Hands-on Guard, Application Guard, Microsoft Defender for ▪ Prepare and use an environment for a hands-on Endpoint, BitLocker Drive Encryption experience. and Compliance . You will explore on-prem ▪ Access resources and labs for up to six months after management and the Intune management possibilities the workshop. for some features, such as Compliance Policies and BitLocker for Co-managed devices. Scope Objectives This offering is scoped for device protection with Microsoft Endpoint Manager and Microsoft Understand how to set up, configure, and manage the Defender for Endpoint. following: ▪ Microsoft Endpoint Configuration Manager Role Agenda Based Access ▪ Endpoint Protection for Microsoft Endpoint Manager Day 1 ▪ Application Guard and Exploit Guard integration ▪ Introduction to Endpoint Security, Role-Based Access ▪ Microsoft Defender for Endpoint Control (RBA), Endpoint Protection Overview, ▪ BitLocker Drive Encryption Endpoint Protection Policies Day 2 Outcomes ▪ CAMP and Security Intelligence Updates, Endpoint Gain knowledge on how to secure your environment and Protection Alerts and Reporting, Endpoint Protection manage Microsoft Defender for Endpoint with Microsoft Troubleshooting, Exploit Guard and Application Endpoint Manager. Guard Day 3 ▪ Microsoft Defender for Endpoint, Device Encryption, Compliance Settings

© Microsoft Corporation. All rights reserved. This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY Delivery Outline Requirements

Participants Delivery Requirements ▪ Microsoft Endpoint Manager Engineers, Security ▪ Computer with Windows 10 or later, audio equipment, Administrators internet access and at least 1 Mbps bandwidth per Skill Requirements participant ▪ Existing knowledge of Microsoft Endpoint Configuration ▪ Microsoft/ ID to connect to the virtual Manager environment ▪ Moderate knowledge of Windows Platform and ▪ Microsoft Teams for remote deliveries Microsoft Security products ▪ A modern browser capable of rendering web sites using ▪ Basic knowledge of Microsoft Endpoint Manager current web standards Time Commitment ▪ Three full-day engagement with relevant roles. It is recommended to attend the entire engagement.

Education

▪ Introduction to security settings that can be managed through Day 1 Introduction to Endpoint Security Microsoft Endpoint Configuration Manager.

▪ Overview of Role-Based Administration concept in Microsoft Day 1 Role-Based Access Control Endpoint Configuration Manager, including Reporting feature.

Endpoint Protection Technologies ▪ Take a deeper dive into the technologies that make up Day 1 Overview Endpoint Protection.

▪ Learn basic concepts and terminology for Endpoint Protection Day 1 Antimalware Policies Antimalware Policies.

CAMP and Security Intelligence ▪ Manage Endpoint Protection Definition updates through Day 2 Updates Configuration Manager.

Endpoint Protection Alerts and ▪ Configure and use alerts and reports notifications within Day 2 Reporting Configuration Manager.

Day 2 Endpoint Protection Troubleshooting ▪ Learn troubleshooting techniques for securing endpoints.

Day 2 ▪ Learn about attack reduction, controlled folder access, Exploit Guard and Application Guard exploit, and network protection and mitigating security threats.

Day 3 ▪ Learn how to onboard endpoints to Microsoft Defender for Microsoft Defender for Endpoint Endpoint using Microsoft Endpoint Configuration Manager.

Day 3 ▪ Learn about BitLocker and explore modern management Device Encryption possibilities to control device encryption (MEMCM and Intune).

Day 3 ▪ Deeper dive into the compliance settings topic using Microsoft Compliance settings Endpoint Manager (Intune).

For more information: Please contact your Microsoft Representative for more details.

© Microsoft Corporation. All rights reserved. This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY