sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
4.2 Deploy the Microsoft Defender for Endpoint environment

4.2 Deploy the Microsoft Defender for Endpoint environment

  • wwlpublish Deploy the Microsoft Defender for Endpoint environment - Trainingwwlpublish Deploy the Microsoft Defender for Endpoint environment - Training
  • Learn to deploy Microsoft Defender for Endpoint by onboarding devices and configuring security settings. By the end of this module, you will be able to create the environment, onboard devices, and configure settings.
‣

Introduction

‣

Create your environment

‣

Understand operating systems compatibility and features

‣

Onboard devices

‣

Manage access

‣

Create and manage roles for role-based access control

‣

Configure device groups

‣

Configure environment advanced features

‣

Knowledge check

‣

Summary and resources

©sameer fakhoury

GitHubLinkedIn