Implementing Microsoft Defender for Endpoint

Intermediate
1m
906
4.5/5

This lesson explores Microsoft Defender for Endpoint and how to implement it. We’ll start off with a quick overview of the three deployment phases that you’ll need to complete in order to implement Defender for Endpoint. We’ll then run through each of the individual deployment phases in a bit more detail.

Learning Objectives

By the time you finish this lesson, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.

Intended Audience

This lesson is intended for anyone who wishes to learn about the steps involved in implementing Microsoft Defender for Endpoint.

Prerequisites

To get the most out of this lesson, you should have a fundamental understanding of basic endpoint protection concepts.

 
About the Author
Students
96,791
Courses
100
Learning paths
53

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.

Covered Topics