Introduction
Manage and secure devices within a cloud-based environment
()
What you should know
()
1. Using Windows Defender Security Center
Windows Defender Security Center
()
Understanding Windows Defender Application Guard
()
Understanding Windows Defender Exploit Guard
()
Understanding Windows Defender Credential Guard
()
DEMO: Managing Windows Defender Credential Guard
()
Understanding Microsoft Defender Advanced Threat Protection
()
Understanding Windows Defender Antivirus
()
Understanding Windows Defender Application Control
()
2. Introduction to Microsoft Intune
Entra ID (formerly Azure AD)
()
Demo: Enabling Entra ID (formerly Azure AD) join
()
Introduction to Microsoft Intune
()
Enrolling devices into Microsoft Intune
()
Bulk enroll devices into MDM
()
Enrolling other platforms
()
Managing devices with Microsoft Intune
()
Managing devices with Microsoft Intune policies
()
Performing remote actions on devices
()
Device inventory reporting
()
3. Monitoring Devices
Introduction to Device Health
()
Monitoring device health
()
Demo: Managing device health
()
Monitoring device security
()
Demo: Managing device security
()
Monitoring device compliance
()
Demo: Managing device compliance
()
4. Deploy and Update Applications
Deploying applications
()
Managing application deployment
()
Enabling sideloading of apps into Windows images
()
Gathering Office readiness data
()
Using Office readiness data
()
Understanding IE Enterprise mode
()
Demo: Configuring Enterprise site list using Intune
()
Configuring and implementing Assigned Access
()
Demo: Implementing Assigned Access
()
5. Mobile Application Management
Mobile Application Management
()
Mobile Application Management policies
()
Securing data using Intune
()
Windows Information Protection
()
Demo: Preventing data leakage using Windows Information Protection
()
Azure Information Protection
()
Demo: Implementing Azure Information Protection
()