New Training: Plan and Implement Threat Protection With Microsoft Defender

In this 7-video skill, CBT Nuggets trainer John Munjoma covers planning and implementing Microsoft Defender for Endpoint. Watch this new Microsoft 365 training.
Learn Microsoft 365 with one of these courses:
This training includes:
7 videos
45 minutes of training
You’ll learn these topics in this skill:
Microsoft Defender for Endpoint
Implementing Microsoft Defender for Identity
Integrating Microsoft Defender With Endpoint Manager
Attack Surface Reduction
Configuring Endpoint Security
Disk Encryption and Firewall Policies
Creating Security Baselines
Consider Using Intune For Microsoft Defender Deployment
Microsoft's Defender product is now available for full endpoint and cloud security protection for the enterprise environment. Defender Endpoint Protection can be deployed in multiple ways via InTune and group policy. Likewise, Defender can be implemented strictly as an on-premise solution, a cloud deployment, or a mix of both. For the cloud or hybrid deployments, it's suggested to use InTune for Defender management.
InTune can be configured to deploy Microsoft Defender Endpoint Protection through the cloud IntTune portal. With Intune, organizations can deploy Defender Endpoint Protection to Windows devices, Mac OS devices, Android smartphones, and iOS devices. It's worth considering using InTune for Defender deployment since it can work with all major computing OSes.
Before applying Defender Endpoint Protection with InTune, consider identifying target users and devices in various groups throughout the business that can be used in a pilot program. Pilot programs are important to ensure that additional configurations won't need to be added to Defender before deploying it to all users within an organization.
For more considerations before deploying Defender, take a look at the Defender deployment infographic created by Microsoft.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.