Customer Offerings:Device Protection w/ Microsoft Endpoint Manager & Microsoft Defender for Endpoint

Published 03-02-2021 12:00 AM 1,039 Views
Microsoft

Introduction 

 

Welcome to another customer offering article to inform you about how to configure, setup, and deploy endpoint protection policies which include protective measures from Microsoft. In this article, we will present Premier Services Offerings WorkshopPLUS - Device Protection with Microsoft Endpoint Manager and Microsoft Defender for Endpoint.

 

Offering Overview 

 

With customers needing a deployment solution to push out Microsoft security policies and configurations, this offering will address this and more. This Premier offering builds on the fundamental security components and features of any Microsoft Endpoint Configuration Manager environment such as RBAC or role-based administration, Endpoint Protection​, Exploit Guard, Application Guard, Microsoft Defender for Endpoint, BitLocker Drive Encryption, and Compliance Settings. With this new customer offering, we were able to provide a 3-day hands on training in a live demo tenant to meet and exceed customer expectations. 

 

What the workshop entailsWhat the workshop entails

 

What's Included 

 

The content of this offering is a mix of education, administration, compliance, and security best practices at the L200-L300 level. This offering focuses on the breadth of Microsoft Endpoint Configuration Manager, Microsoft Defender for Endpoint, M365 Security (on-prem and in the cloud), and also Intune. The Device Protection with Microsoft Endpoint Manager and Microsoft Defender for Endpoint workshop is a three day engagement where you will learn about configuring a tenant using  labs hosted in the cloud (Microsoft Labs on Demand) with a full M365 E5 license (EMS E5 + M365 E5 + Office 365 E5). Each module contains scenarios that provide students with in-depth expertise, tools, and hands-on experience to help implement and troubleshoot security related concepts as they pertain to Microsoft Endpoint Configuration  Manager. 

 

Endpoint Protection policiesEndpoint Protection policies

 

Areas Covered 

 

The sections  below sections are covered in detail throughout the three-day offering and expand on each objective to maximize your understanding of each topic and focus area through knowledge transfer modules. 

 

Introduction to Endpoint Security​ - Overall introduction to security settings and recommendations that can be managed using Microsoft Endpoint Configuration Manager and Intune.

 

Role Based Access Control – Overview of Role Based Administration Control concept in Microsoft Endpoint Configuration Manager, including the reporting feature.

 

Endpoint Protection Technologies Overview - Objectives focus on a deeper dive into the technologies that make up Endpoint Protection.

 

Antimalware Policies - Objectives focus on learning the basic concepts and terminology for Endpoint Protection Antimalware Policies for Microsoft Defender Antivirus.

 

CAMP and Security Intelligence Updates - Objectives focus on managing Endpoint Protection Definition updates through Configuration Manager. 

 

Endpoint Protection Alerts and Reporting - Objectives focus on how to configure and use alerts and report notifications within Configuration Manager. 

 

Endpoint Protection Troubleshooting - Objectives focus on learning troubleshooting techniques for securing endpoints.   


Exploit Guard and Application Guard - Objectives focus on learning about Attack Surface Reduction, Controlled Folder Access, and Exploit and Network Protection. You will also learn how to mitigate security threats using containers by deploying Application Guard.  

 

Microsoft Defender for Endpoint - Objectives focus on learning how to onboard endpoints to Microsoft Defender for Endpoint using Microsoft Endpoint Configuration Manager and explore basic operational possibilities within Microsoft Defender for Endpoint portal.  

 

Device Encryption - Learn what is BitLocker and explore modern management possibilities to control device encryption with Microsoft Endpoint Configuration Manager and Intune.  

 

Compliance settings - Dive deeper into the compliance settings topic, including management possibilities using Microsoft Endpoint Manager (Intune).  

 

Hands on with Labs on Demand

 

During this offering there are multiple hands-on labs exercises using Microsoft’s Labs on Demand. Each student will be an administrator of their own demo tenant where they will create and deploy security policies using Microsoft Endpoint Configuration Manager. Once the polices are deployed to another machine, the student will be able to view and test out those policies. The areas are listed below are covered in the lab exercises: 

 

  • Endpoint Security
  • Implementing RBAC 
  • Endpoint Protection policies
  • CAMP and Security Intelligence updates 
  • Endpoint protection alerts and reporting 
  • Endpoint protection troubleshooting 
  • Exploit Guard and Application Guard 
  • Microsoft Defender for Endpoint
  • Device Encryption 
  • Compliance settings 

  

Creating the configuration file for Endpoints for MDECreating the configuration file for Endpoints for MDE

 

 

Configuring Attack Surface Reduction RulesConfiguring Attack Surface Reduction Rules

 

 

Configuring Bitlocker drive encryption in MEMConfiguring Bitlocker drive encryption in MEM

 

Objectives

 

After completing this course, you will understand how to set up, configure, and manage Microsoft Endpoint Configuration Manager Role Based Access​, Endpoint Protection for Microsoft Endpoint Manager, Application Guard and Exploit Guard integration​, Microsoft Defender for Endpoint​, BitLocker Drive Encryption, and compliance settings.

 

Key Personnel For this Offering 

 

This course is targeted at IT staff who have already started designing and implementing Microsoft Endpoint Configuration Manager integration with Microsoft Security products and concepts. To ensure that students are successful at the end of this WorkshopPLUS, it is highly recommended they meet the following criteria:​

 

  • Existing knowledge of Microsoft Endpoint Configuration Manager ​
  • Moderate knowledge of Windows Platform and Microsoft Security products​
  • Basic knowledge of Microsoft Endpoint Manager (Intune)​

 

Disclaimer 

 

As of this writing, the above modules are in scope. However, they might change as Microsoft Endpoint Configuration Manager, Intune, Microsoft Defender for Endpoint, and M365 Security are subject to change. 

 

Follow up and feedback

 

For further information, please contact your Microsoft Account Representative, Customer Success Account Manager (CSAM), or Service Delivery Manager (SDM).

 

To improve this or any other workshop, we always consider feedback from you. At Microsoft, achieving a high level of satisfaction among our customers and partners around the world is a core component of our business. For that reason, please don’t hesitate to complete the surveys and provide feedback.

 

Credit 

 

Special thanks and credit to the development team:

 

Anton Tatarkin, Senior Customer Engineer, Intune / EMS / Configuration Manager, Netherlands

 

John Barbare, Senior Customer Engineer - Cybersecurity, Monitoring Solutions (Sentinel, M365 Defender, MDE, MDI, MCAS), Unites States

 

Charles Baldridge, Customer Engineer, Configuration Manager, United States

%3CLINGO-SUB%20id%3D%22lingo-sub-2129294%22%20slang%3D%22en-US%22%3ECustomer%20Offerings%3ADevice%20Protection%20w%2F%20Microsoft%20Endpoint%20Manager%20%26amp%3B%20Microsoft%20Defender%20for%20Endpoint%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2129294%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%3CSTRONG%3EIntroduction%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWelcome%26nbsp%3Bto%20another%20customer%20offering%20article%20to%20inform%26nbsp%3Byou%20about%20how%20to%20configure%2C%20setup%2C%20and%20deploy%20endpoint%20protection%20policies%20which%20include%26nbsp%3Bprotective%20measures%26nbsp%3Bfrom%20Microsoft.%26nbsp%3BIn%20this%20article%2C%20we%20will%20present%20Premier%20Services%20Offerings%20WorkshopPLUS%20-%20Device%20Protection%20with%20Microsoft%20Endpoint%20Manager%20and%20Microsoft%20Defender%20for%20Endpoint%3C%2FSPAN%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EOffering%20Overview%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWith%20customers%20needing%20a%20deployment%20solution%20to%20push%20out%20Microsoft%20security%20policies%20and%20configurations%2C%20this%20offering%20will%20address%20this%20and%20more.%20This%20Premier%20offering%20builds%20on%20the%20fundamental%20security%20components%20and%20features%20of%20any%20Microsoft%20Endpoint%20Configuration%20Manager%20environment%20such%20as%20RBAC%20or%20role-based%20administration%2C%20Endpoint%20Protection%20%2C%20Exploit%20Guard%2C%20Application%20Guard%2C%20Microsoft%20Defender%20for%20Endpoint%2C%20BitLocker%20Drive%20Encryption%2C%20and%20Compliance%20Settings.%20With%20this%20new%26nbsp%3Bcustomer%20offering%2C%26nbsp%3Bwe%20were%20able%20to%20provide%20a%26nbsp%3B3-day%26nbsp%3Bhands%20on%20training%20in%20a%20live%20demo%20tenant%20to%20meet%20and%20exceed%20customer%20expectations.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22John_Barbare_0-1613153232534.png%22%20style%3D%22width%3A%201001px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F254554iF4F120345ACA11D5%2Fimage-dimensions%2F1001x305%3Fv%3D1.0%22%20width%3D%221001%22%20height%3D%22305%22%20role%3D%22button%22%20title%3D%22John_Barbare_0-1613153232534.png%22%20alt%3D%22What%20the%20workshop%20entails%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EWhat%20the%20workshop%20entails%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EWhat's%20Included%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20content%20of%20this%20offering%20is%20a%20mix%20of%26nbsp%3Beducation%2C%20administration%2C%26nbsp%3Bcompliance%2C%20and%20security%20best%20practices%20at%26nbsp%3Bthe%26nbsp%3BL200-L300%20level.%20This%20offering%20focuses%20on%20the%20breadth%20of%26nbsp%3BMicrosoft%20Endpoint%20Configuration%20Manager%2C%20Microsoft%20Defender%20for%20Endpoint%2C%20M365%20Security%20(on-prem%20and%20in%20the%20cloud)%2C%20and%20also%20Intune.%20The%20Device%20Protection%20with%20Microsoft%20Endpoint%20Manager%20and%20Microsoft%20Defender%20for%20Endpoint%20workshop%20is%26nbsp%3Ba%20three%20day%26nbsp%3Bengagement%20where%20you%20will%20learn%20about%20configuring%20a%20tenant%20using%26nbsp%3B%20labs%20hosted%20in%20the%20cloud%20(Microsoft%20Labs%20on%20Demand)%20with%20a%20full%20M365%20E5%20license%20(EMS%20E5%20%2B%20M365%20E5%20%2B%20Office%20365%20E5).%20Each%20module%20contains%20scenarios%20that%20provide%20students%20with%20in-depth%20expertise%2C%20tools%2C%20and%20hands-on%20experience%20to%20help%20implement%20and%20troubleshoot%20security%20related%20concepts%20as%20they%20pertain%20to%20Microsoft%20Endpoint%20Configuration%26nbsp%3B%20Manager.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22John_Barbare_1-1613153232543.png%22%20style%3D%22width%3A%201005px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F254555i4B8CBFE9B1C5712D%2Fimage-dimensions%2F1005x664%3Fv%3D1.0%22%20width%3D%221005%22%20height%3D%22664%22%20role%3D%22button%22%20title%3D%22John_Barbare_1-1613153232543.png%22%20alt%3D%22Endpoint%20Protection%20policies%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EEndpoint%20Protection%20policies%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EAreas%20Covered%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20sections%26nbsp%3B%20below%26nbsp%3Bsections%26nbsp%3Bare%20covered%20in%20detail%20throughout%20the%26nbsp%3Bthree-day%26nbsp%3Boffering%26nbsp%3Band%20expand%20on%20each%20objective%20to%20maximize%20your%20understanding%20of%20each%20topic%20and%20focus%20area%20through%20knowledge%20transfer%20modules.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EIntroduction%20to%20Endpoint%20Security%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Overall%20introduction%20to%20security%20settings%20and%20recommendations%20that%20can%20be%20managed%20using%20Microsoft%20Endpoint%20Configuration%20Manager%20and%20Intune.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3ERole%20Based%20Access%20Control%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%E2%80%93%26nbsp%3BOverview%20of%20Role%20Based%20Administration%20Control%20concept%20in%20Microsoft%20Endpoint%20Configuration%20Manager%2C%20including%20the%20reporting%20feature.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EEndpoint%20Protection%20Technologies%20Overview%20-%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3EObjectives%20focus%20on%20a%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3Edeeper%20dive%20into%20the%20technologies%20that%20make%20up%20Endpoint%20Protection.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EAntimalware%20Policies%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Objectives%20focus%20on%26nbsp%3Blearning%20the%20basic%20concepts%20and%20terminology%20for%20Endpoint%20Protection%20Antimalware%20Policies%20for%20Microsoft%20Defender%20Antivirus.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3ECAMP%20and%20Security%20Intelligence%20Updates%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3EObjectives%20focus%20on%20managing%20Endpoint%20Protection%20Definition%20updates%20through%20Configuration%20Manager.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EEndpoint%20Protection%20Alerts%20and%20Reporting%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Objectives%20focus%20on%26nbsp%3Bhow%20to%20configure%20and%20use%20alerts%20and%20report%20notifications%20within%20Configuration%20Manager.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EEndpoint%20Protection%20Troubleshooting%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Objectives%20focus%20on%26nbsp%3Blearning%20troubleshooting%20techniques%20for%20securing%20endpoints.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSPAN%3E%3CSTRONG%3EExploit%20Guard%20and%20Application%20Guard%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Objectives%20focus%20on%26nbsp%3Blearning%20about%20Attack%20Surface%20Reduction%2C%20Controlled%20Folder%20Access%2C%20and%20Exploit%20and%20Network%20Protection.%20You%20will%20also%20learn%20how%20to%20mitigate%20security%20threats%20using%20containers%20by%20deploying%20Application%20Guard.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EMicrosoft%20Defender%20for%20Endpoint%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Objectives%20focus%20on%26nbsp%3Blearning%20how%20to%20onboard%20endpoints%20to%20Microsoft%20Defender%20for%20Endpoint%20using%20Microsoft%20Endpoint%20Configuration%20Manager%20and%20explore%20basic%20operational%20possibilities%20within%20Microsoft%20Defender%20for%20Endpoint%20portal.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EDevice%20Encryption%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Learn%20what%20is%20BitLocker%20and%20explore%20modern%20management%20possibilities%20to%20control%20device%20encryption%20with%20Microsoft%20Endpoint%20Configuration%20Manager%20and%20Intune.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3ECompliance%20settings%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E-%20Dive%20deeper%20into%20the%20compliance%20settings%20topic%2C%20including%20management%20possibilities%20using%20Microsoft%20Endpoint%20Manager%20(Intune).%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EHands%20on%20with%20Labs%20on%20Demand%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EDuring%20this%26nbsp%3Boffering%26nbsp%3Bthere%26nbsp%3Bare%26nbsp%3Bmultiple%20hands-on%20labs%20exercises%20using%20Microsoft%E2%80%99s%20Labs%20on%20Demand.%20Each%20student%20will%20be%20an%20administrator%20of%20their%20own%20demo%20tenant%20where%20they%20will%20create%20and%20deploy%20security%20policies%20using%20Microsoft%20Endpoint%20Configuration%20Manager.%20Once%20the%20polices%20are%20deployed%20to%20another%20machine%2C%20the%20student%20will%20be%20able%20to%20view%20and%20test%20out%20those%20policies.%20The%20areas%20are%20listed%20below%20are%20covered%20in%20the%20lab%20exercises%3A%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSPAN%3EEndpoint%20Security%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EImplementing%20RBAC%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EEndpoint%20Protection%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3Bpolicies%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3ECAMP%20and%20Security%20Intelligence%20updates%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EEndpoint%20protection%20alerts%20and%20reporting%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EEndpoint%20protection%20troubleshooting%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EExploit%20Guard%20and%20Application%20Guard%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EDevice%20Encryption%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3ECompliance%20settings%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22John_Barbare_2-1613153232558.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F254556i16F90FF42FE062E9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22John_Barbare_2-1613153232558.png%22%20alt%3D%22Creating%20the%20configuration%20file%20for%20Endpoints%20for%20MDE%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ECreating%20the%20configuration%20file%20for%20Endpoints%20for%20MDE%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22John_Barbare_3-1613153232570.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F254557i740B06B67C2E3655%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22John_Barbare_3-1613153232570.png%22%20alt%3D%22Configuring%20Attack%20Surface%20Reduction%20Rules%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EConfiguring%20Attack%20Surface%20Reduction%20Rules%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22John_Barbare_4-1613153232579.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F254558i1E6895CF49D4E0BF%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22John_Barbare_4-1613153232579.png%22%20alt%3D%22Configuring%20Bitlocker%20drive%20encryption%20in%20MEM%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EConfiguring%20Bitlocker%20drive%20encryption%20in%20MEM%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EObjectives%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EAfter%20completing%20this%20course%2C%20you%20will%20understand%20how%26nbsp%3Bto%26nbsp%3Bset%20up%2C%20configure%2C%20and%20manage%20Microsoft%20Endpoint%20Configuration%26nbsp%3BManager%26nbsp%3BRole%20Based%26nbsp%3BAccess%20%2C%20Endpoint%20Protection%20for%20Microsoft%20Endpoint%20Manager%2C%20Application%20Guard%20and%20Exploit%20Guard%20integration%20%2C%20Microsoft%20Defender%20for%20Endpoint%20%2C%20BitLocker%20Drive%20Encryption%2C%20and%20compliance%20settings.%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EKey%20Personnel%20For%20this%20Offering%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20course%20is%20targeted%20at%20IT%20staff%20who%20have%20already%20started%20designing%20and%20implementing%20Microsoft%20Endpoint%20Configuration%20Manager%20integration%20with%20Microsoft%20Security%20products%20and%20concepts.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3ETo%20ensure%20that%20students%20are%20successful%20at%20the%20end%20of%20this%26nbsp%3BWorkshopPLUS%2C%20it%20is%20highly%20recommended%20they%20meet%20the%26nbsp%3Bfollowing%20criteria%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EExisting%20knowledge%20of%20Microsoft%20Endpoint%26nbsp%3BConfiguration%20Manager%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EModerate%20knowledge%20of%20Windows%20Platform%20and%26nbsp%3BMicrosoft%20Security%20products%3C%2FLI%3E%0A%3CLI%3EBasic%20knowledge%20of%20Microsoft%20Endpoint%20Manager%26nbsp%3B(Intune)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EDisclaimer%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAs%20of%20this%20writing%2C%20the%20above%20modules%20are%20in%20scope.%20However%2C%20they%20might%20change%20as%26nbsp%3BMicrosoft%20Endpoint%20Configuration%20Manager%2C%20Intune%2C%20Microsoft%20Defender%20for%20Endpoint%2C%20and%20M365%20Security%20are%20subject%20to%20change.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EFollow%20up%20and%20feedback%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20further%20information%2C%20please%20contact%20your%20Microsoft%20Account%20Representative%2C%20Customer%20Success%20Account%20Manager%20(CSAM)%2C%20or%20Service%20Delivery%20Manager%20(SDM).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20improve%20this%20or%20any%20other%20workshop%2C%20we%20always%20consider%20feedback%20from%20you.%20At%20Microsoft%2C%20achieving%20a%20high%20level%20of%20satisfaction%20among%20our%20customers%20and%20partners%20around%20the%20world%20is%20a%20core%20component%20of%20our%20business.%20For%20that%20reason%2C%20please%20don%E2%80%99t%20hesitate%20to%20complete%20the%20surveys%20and%20provide%20feedback.%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3ECredit%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ESpecial%20thanks%20and%20credit%20to%20the%20development%20team%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fanton-tatarkin-42818369%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAnton%20Tatarkin%3C%2FA%3E%3CSPAN%3E%2C%20Senior%20Customer%20Engineer%2C%20Intune%20%2F%20EMS%20%2F%20Configuration%20Manager%2C%20Netherlands%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjohn-barbare-m-s-cybersecurity-82732469%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EJohn%20Barbare%3C%2FA%3E%3CSPAN%3E%2C%20Senior%20Customer%20Engineer%20-%20Cybersecurity%2C%20Monitoring%20Solutions%20(Sentinel%2C%20M365%20Defender%2C%20MDE%2C%20MDI%2C%20MCAS)%2C%20Unites%20States%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fcharlesbaldridge%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ECharles%20Baldridge%3C%2FA%3E%3CSPAN%3E%2C%20Customer%20Engineer%2C%20Configuration%20Manager%2C%20United%20States%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2129294%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20new%20workshop%20introduces%20configuration%20deployment%20in%20a%20lab%20using%26nbsp%3BMicrosoft%20Endpoint%20Manager%20for%20Microsoft%20Defender%20for%20Endpoint.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2129294%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECustomer%20Offerings%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EJohnBarbare%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Mar 02 2021 09:17 AM
Updated by: