1. Home
  2. Training Library
  3. Microsoft 365
  4. Courses
  5. Implementing Microsoft Defender for Endpoint

Deployment Phases of Defender for Endpoint

Deployment Phases of Defender for Endpoint
Overview
Difficulty
Intermediate
Duration
14m
Students
69
Ratings
3.6/5
starstarstarstar-halfstar-border
Description

This course explores Microsoft Defender for Endpoint and how to implement it. We’ll start off with a quick overview of the three deployment phases that you’ll need to complete in order to implement Defender for Endpoint. We’ll then run through each of the individual deployment phases in a bit more detail.

Learning Objectives

By the time you finish this course, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.

Intended Audience

This course is intended for anyone who wishes to learn about the steps involved in implementing Microsoft Defender for Endpoint.

Prerequisites

To get the most out of this course, you should have a fundamental understanding of basic endpoint protection concepts.

 
Transcript

Welcome to the deployment phases of Defender for Endpoint. In this lesson, we’ll take a quick look at the 3 deployment phases of Defender for Endpoint.

Once you’ve gone through the deployment planning for Defender for Endpoint, it’s time to deploy. Deployment of Defender for Endpoint is typically performed in three phases. They include Preparation, Setup, and Onboarding.

It’s during the initial preparation phase that you’ll research things that you need to consider when deploying Defender for Endpoint in your environment. You’ll need to determine who the stakeholders are, who will provide necessary approvals, and you’ll also want to account for environment considerations, access permissions, and adoption order of capabilities.

After working through the Preparation phase of your deployment, you’ll need to work through the Setup phase. During the setup phase, you decide on the steps you need to take to access the portal. Considerations and tasks include license validation, completion of the setup wizard, and network configuration.

The last phase is the Onboarding phase. During this last deployment phase, you learn how to make use of deployment rings, you learn about the supported onboarding tools, based on the type of endpoints you are dealing with, and, of course, configuring available capabilities.

Over the next few lessons, we’ll take a closer look at each deployment phase.

About the Author
Avatar
Thomas Mitchell
Instructor
Students
43677
Courses
57
Learning Paths
16

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.