wwlpublish Deploy the Microsoft Defender for Endpoint environment - Training
- Learn to
deploy
Microsoft Defender for Endpoint byonboarding devices and configuring security settings
. By the end of this module, you will be able to create the environment, onboard devices, and configure settings.
‣
Introduction
‣
Create your environment
‣
Understand operating systems compatibility and features
‣
Onboard devices
‣
Manage access
‣
Create and manage roles for role-based access control
‣
Configure device groups
‣
Configure environment advanced features
‣
Knowledge check
‣