New Skills

New Training: Plan and Implement Threat Protection With Microsoft Defender

by Team Nuggets
New Training: Manage Information Governance picture: A
Published on April 20, 2021

In this 7-video skill, CBT Nuggets trainer John Munjoma covers planning and implementing Microsoft Defender for Endpoint. Watch this new Microsoft 365 training.

Learn Microsoft 365 with one of these courses:

This training includes:

  • 7 videos

  • 45 minutes of training

You’ll learn these topics in this skill:

  • Microsoft Defender for Endpoint

  • Implementing Microsoft Defender for Identity

  • Integrating Microsoft Defender With Endpoint Manager

  • Attack Surface Reduction

  • Configuring Endpoint Security

  • Disk Encryption and Firewall Policies

  • Creating Security Baselines

Consider Using Intune For Microsoft Defender Deployment

Microsoft's Defender product is now available for full endpoint and cloud security protection for the enterprise environment. Defender Endpoint Protection can be deployed in multiple ways via InTune and group policy. Likewise, Defender can be implemented strictly as an on-premise solution, a cloud deployment, or a mix of both. For the cloud or hybrid deployments, it's suggested to use InTune for Defender management.

InTune can be configured to deploy Microsoft Defender Endpoint Protection through the cloud IntTune portal. With Intune, organizations can deploy Defender Endpoint Protection to Windows devices, Mac OS devices, Android smartphones, and iOS devices. It's worth considering using InTune for Defender deployment since it can work with all major computing OSes.

Before applying Defender Endpoint Protection with InTune, consider identifying target users and devices in various groups throughout the business that can be used in a pilot program. Pilot programs are important to ensure that additional configurations won't need to be added to Defender before deploying it to all users within an organization.

For more considerations before deploying Defender, take a look at the Defender deployment infographic created by Microsoft.



Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

Don't Miss Out

Get great content delivered to your inbox.

I have read and understood the privacy policy, and am able to consent to it.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2022 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522