Device and Application Protection in Microsoft 365
1h 9m

Microsoft 365 provides multiple features and services for connecting, managing, and protecting corporate data within devices. It is critical for you as an IT administrator to understand the features available to protect any device connecting to Microsoft 365 services. This course will focus on what you need to know and do to successfully manage different types of devices. At the end of this course, you will know the various options and when to use which component, service, or tool. We will also discuss some important things to note when working with devices.

Learning Objectives

  • Plan for device and application protection
  • Configure and manage exploit protection
  • Configure and manage Windows device encryption
  • Configure and manage non-Windows device encryption
  • Implement application protection policies
  • Configure and manage device compliance for endpoint security

Intended Audience

This course is for people who want to become a Microsoft 365 Certified: Security Administrator Associate or are preparing to take the MS-500 exam.


To get the most from this course, you should have a Microsoft 365 tenant and an account with Global Administrator access. You will also need a Microsoft Intune license and devices to test within the tenant, such as a phone, tablet, or Windows workstation.


Hello and welcome to this course on Device and Application Protections within Microsoft 365. My name is Liam Cleary and I am your instructor for this course. I'm a Microsoft MVP and a Microsoft certified trainer focusing on Microsoft 365 and Azure. I hold multiple certifications for both Microsoft 365 and Azure, and you can reach out to me with my contact information that's available on the screen. For any other issues, you can always get in touch with us here at Cloud Academy by emailing and one of our cloud experts will follow up with you. 

So, who should attend this course? If you are an IT administrator or Microsoft 365 administrator, or you work with Microsoft 365 everyday in some administration capacity, then this course is for you. This course is also intended for people who want to become a Microsoft 365 Certified Security Administrator Associate. Our overall objective for this course is to understand how to implement and manage devices within Microsoft 365. For us to meet this objective, we will complete these objectives: Plan for device and application protection, configure and manage exploit protection, configure and manage Windows device encryption, configure and manage Non-Windows device encryption, implement application protection policies, and then configure and manage device compliance for endpoint security. 

We will step through a few of these topics directly within a Microsoft 365 tenant using the administration centers and also PowerShell. We recommend to get the most out of the course, you should have a Microsoft 365 tenant with an account that has global administrator access. You will also need licenses that include Microsoft Intune and devices to test within the tenant, such as a phone, a tablet or a Windows workstation. Please note that at the time of writing this content, all course information was accurate. Feedback on course's content that's hosted at Cloud Academy is always appreciated and encouraged. It allows us as trainers to improve, which helps our students taking courses in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you could contact


About the Author

Liam Cleary is a Microsoft MVP and Microsoft Certified Trainer focused on Microsoft 365 and Azure. He's been working with Microsoft Cloud and Azure technologies since their creation and focuses heavily on deployments, management, and the security of Microsoft 365 and Azure. He also holds multiple certifications for both Microsoft 365 and Azure.