This course explores the suite of tools available in Microsoft Endpoint Manager for establishing and maintaining security posture in an organization. These include tools like Microsoft Intune, used for enrolling devices as well as creating and enforcing device compliance, and Microsoft Defender, used for implementing device antivirus and malware defense tools. This course will also review the activities involved in reducing attack surfaces in an organization that bad actors could use to penetrate and expose sensitive data. This sensitive data is protected through the implementation of attack surface reduction rules which are deployed through careful auditing and testing to prevent any loss of productivity. This course will also touch on the security baselines made available to organizations wishing to enact a more granular security posture and have access to tools like secure score for evaluating the effectiveness of these efforts against known best practices.
- Create a compliance policy
- Monitor enrolled devices
- Setup surface attack reduction rules
- Deploy surface attack reduction rules
- Review security baselines
- Examine Microsoft secure score
This course is designed for individuals who are responsible for setting up and monitoring device compliance and security in Microsoft 365 as well as those pursuing Microsoft certifications.
To get the most from this course, you should have some familiarity and experience with the Microsoft 365 security suite of tools including Microsoft Endpoint Manager.
Welcome to Manage Device Compliance. In this course, we will look at the various tools available to Azure administrators to secure and monitor devices, such as laptops and cell phones, in order to protect sensitive company data and prevent external threats such as malware or hackers from gaining access. Let's have a look at what you can expect in this course. My name is Steven Wise and I'll be guiding you through a number of topics in this course. I'm currently a Solutions Architect and have been using Azure and Microsoft 365 in various capacities since 2015. In my current and previous jobs, I have assisted with the administration of Azure security tools to large enterprise organizations and have guided their strategy in how to use the program properly and effectively. If you run into issues throughout this course, please feel free to contact support at email@example.com. They have a team ready to assist you throughout your course learning process. Who is the intended audience for this particular course? Well, first and foremost, this course is designed for individuals that are working with the Azure compliance suite of products. This includes Microsoft Endpoint Manager, Intune, and Azure Identity Protection. It offers a deep dive into many of the features of these programs. This course is specifically designed to help individuals pass Microsoft's security related certification assessment. They will find this course to supplement what they already know and support them in areas where they may need more help. Of course, not everyone uses every part of Microsoft Endpoint Manager out of the gate, so this course will also support anyone looking to improve their understanding of the entire program. Let's take a look at the course objectives. Throughout these lectures, we will plan for device compliance using Intune in Endpoint Manager.
We will also plan for surface attack reduction implementation and discover how to configure security baselines across Azure. There are a few prerequisites worth noting. First, If you're taking this course, you should already be familiar with and using Azure and/or Microsoft 365 across the organization. This may include some experience working with Microsoft Endpoint Manager where most of these security programs reside. Last, you should be curious and inquisitive about how to best utilize the feature set within Azure and Microsoft 365. The product team is always building and iterating on these programs, so it's important to always keep that attitude of wanting to learn more. Please remember that after you finish this course, rate the course and provide any feedback, whether positive or negative to firstname.lastname@example.org.
This helps the team best understand what course content is working well and what content can be improved. One important consideration for this course is that I'll be using screenshots that are current at the time of creating this course content. Programs like Microsoft Endpoint Manager tend to change or get redesigned every few years, so please reach out to the support team if you notice that updates or corrections are needed. Let's have a look at the agenda for this course. We'll be stepping through 15 modules related to device compliance and security. In the first lecture group, Plan for Device Compliance, we'll look at how to use tools like Intune to create compliance policies, enroll devices, and monitor their implementation. In the next section, titled Attack Surface Reduction, we'll look at how to set up and deploy these rules in order to protect devices from negative actors and software. In the last section of the course, we'll review the security baselines that Microsoft makes available for protecting our devices. And finally, we'll finish with a small summary course review.
Steve is an experienced Solutions Architect with over 10 years of experience serving customers in the data and data engineering space. He has a proven track record of delivering solutions across a broad range of business areas that increase overall satisfaction and retention. He has worked across many industries, both public and private, and found many ways to drive the use of data and business intelligence tools to achieve business objectives. He is a persuasive communicator, presenter, and quite effective at building productive working relationships across all levels in the organization based on collegiality, transparency, and trust.