DEPLOYING DEFENDER FOR ENDPOINT
This course explores Microsoft Defender for Endpoint and how to implement it. We’ll start off with a quick overview of the three deployment phases that you’ll need to complete in order to implement Defender for Endpoint. We’ll then run through each of the individual deployment phases in a bit more detail.
By the time you finish this course, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.
This course is intended for anyone who wishes to learn about the steps involved in implementing Microsoft Defender for Endpoint.
To get the most out of this course, you should have a fundamental understanding of basic endpoint protection concepts.
Congratulations. You’ve come to the end of the course. Let’s review what you’ve learned.
We started off with a quick overview of the 3 deployment phases that you need to complete in order to implement Defender for Endpoint.
We then ran through each of the individual deployment phases in a bit more detail.
At this point, you should have a good understanding of the steps necessary when implementing Microsoft Defender for Endpoint.
To learn more about implementing Microsoft Defender for Endpoint, you can, and should, read Microsoft’s published documentation. You should also keep an eye out for new courses on Cloud Academy, because we’re always publishing new ones. Be sure to give this course a rating, and if you have any questions or comments, please let us know. As always, thanks for watching, and happy learning!
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.