Welcome to our monthly blog series featuring the latest Security, Compliance, and Identity content updates on Microsoft Learn. This month, we’re highlighting a new module focused on how to create device configuration profiles using Microsoft Endpoint Manager along with content to prepare you for our Azure Security Engineer Associate certification exam and our new Cybersecurity Architect Expert exam.
Create device configuration profiles using Microsoft Endpoint Manager
Microsoft Endpoint Manager helps you protect the devices that people in your organization use to stay productive. Our new Create device configuration profiles using Microsoft Endpoint Manager module will help you understand the capabilities of device configuration profiles available in Microsoft Endpoint Manager.
Before you embark on this module, you will need to have:
- Basic knowledge of Microsoft Endpoint Manager and Endpoint management concepts. See Microsoft Endpoint Manager fundamentals
- Clarity about your endpoint management objectives, device inventory considerations, licensing needs, infrastructure objectives, and roll out plans. See Determine your endpoint management implementation
- Working knowledge of how to set up and use Intune. See Set up Microsoft Intune
Once you begin this module, you’ll go through:
- Device configuration concepts
- Fundamental, protective, and comprehensive device configuration profiles
- How to create and assign new device configuration profiles
- How to view device configuration profiles
Microsoft Azure Security Engineer
Part of the requirements for our Microsoft Certified: Azure Security Engineer Associate certification, this credential is designed for security engineers that implement and manage secure cloud solutions. We recently updated our four-part learning path series to prepare candidates for Exam AZ- 500: Microsoft Azure Security Technologies. This learning path will provide instruction on how to:
- Manage identity and access
- Implement platform protection
- Secure your data and applications
- Manage security operation
Microsoft Cybersecurity Architect
If you have expertise in designing and evolving all aspects of your organization’s cybersecurity strategy, our new Microsoft Certified: Cybersecurity Architect Expert certification could be right for you. We recently released a new four-part learning path series to prepare you for Exam SC-100: Microsoft Cybersecurity Architect (beta). This learning path covers how to:
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
We’re excited to hear about how our content is helping you advance your skills, technical expertise, or career progression. Be sure to check out our Microsoft Security Certifications poster to get an overview of all our role-based credentials.