wwlpublish Deploy the Microsoft Defender for Endpoint environment - Training
- Learn to
deployMicrosoft Defender for Endpoint byonboarding devices and configuring security settings. By the end of this module, you will be able to create the environment, onboard devices, and configure settings.
‣
Introduction
‣
Create your environment
‣
Understand operating systems compatibility and features
‣
Onboard devices
‣
Manage access
‣
Create and manage roles for role-based access control
‣
Configure device groups
‣
Configure environment advanced features
‣
Knowledge check
‣