Configure and manage certificates on client devices – Deploy and upgrade operating systems

Configure and manage certificates on client devices Certificates are commonly used to provide for device authentication. It’s important that you know how to configure and manage certificates on your...

Read More

Implement and manage Microsoft Defender Application Guard – Manage and protect devices

Implement and manage Microsoft Defender Application Guard Microsoft Defender Application Guard isolates browser sessions from the local device by running those sessions in a virtual machine environment; this helps...

Read More

Implement Microsoft Defender for Endpoint – Manage and protect devices

Implement Microsoft Defender for Endpoint Microsoft Defender for Endpoint (formerly Windows Defender Advanced Threat Protection) is a security platform built into Windows 10 and integrated with Microsoft cloud-based security...

Read More

Integrate Microsoft Defender Application Control – Manage and protect devices

Integrate Microsoft Defender Application Control Microsoft Defender Application Control enables you to determine precisely which apps your users are allowed to run; it does so by blocking any unsigned...

Read More

Create a default Microsoft Defender Application Control policy – Manage and protect devices

Create a default Microsoft Defender Application Control policy To create a default policy, start by creating a reference computer that is virus- and malware-free and that contains the set...

Read More

Manage Microsoft Defender Antivirus – Manage and protect devices

Manage Microsoft Defender Antivirus Malicious software can do many things to your computer, such as allowing unauthorized parties remote access to your computer or collecting and transmitting information that...

Read More

Implement compliance policies for devices – Manage policies and profiles

Skill 2.1: Implement compliance policies for devices Once you begin to manage Windows 10 devices using standalone Microsoft Intune or integrated into Microsoft Endpoint Manager, you will want to...

Read More

Network location-based compliance policy – Manage policies and profiles

Network location-based compliance policy Managing devices is easy when they are confined within a traditional office setting. Administrators often find that once mobile devices are permanently away from the...

Read More