Blog Post

Microsoft Learn Blog
2 MIN READ

The 2-Minute Recap : Everything new with Security, Compliance, and Identity on Microsoft Learn

Temante_Leary's avatar
Temante_Leary
Former Employee
Jun 28, 2022

Welcome to our monthly blog series featuring the latest https://docs.microsoft.com/learn/topics/sci?wt.mc_id=security_2minrcp_blog_wwl content updates on Microsoft Learn. This month, we’re highlighting a new module focused on how to create device configuration profiles using Microsoft Endpoint Manager along with content to prepare you for our Azure Security Engineer Associate certification exam and our new Cybersecurity Architect Expert exam.

 

Create device configuration profiles using Microsoft Endpoint Manager

https://www.microsoft.com/security/business/microsoft-endpoint-manager helps you protect the devices that people in your organization use to stay productive. Our new https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/?wt.mc_id=security_2minrcp_blog_wwl module will help you understand the capabilities of device configuration profiles available in Microsoft Endpoint Manager.

 

Before you embark on this module, you will need to have:

  • Basic knowledge of Microsoft Endpoint Manager and Endpoint management concepts. See https://docs.microsoft.com/learn/paths/endpoint-manager-fundamentals/?wt.mc_id=security_2minrcp_blog_wwl
  • Clarity about your endpoint management objectives, device inventory considerations, licensing needs, infrastructure objectives, and roll out plans. See https://docs.microsoft.com/learn/modules/determine-endpoint-implementation/?wt.mc_id=security_2minrcp_blog_wwl
  • Working knowledge of how to set up and use Intune. See https://docs.microsoft.com/learn/modules/set-up-microsoft-intune/?wt.mc_id=security_2minrcp_blog_wwl

 

Once you begin this module, you’ll go through:

  • https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/2-understand-configuration-profiles?wt.mc_id=security_2minrcp_blog_wwl
  • https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/3-fundamental-device-configuration?wt.mc_id=security_2minrcp_blog_wwl, https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/4-standard-device-configuration?wt.mc_id=security_2minrcp_blog_wwl, and https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/5-complex-device-configuration?wt.mc_id=security_2minrcp_blog_wwl device configuration profiles
  • How to https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/8-create-vpn-profile?wt.mc_id=security_2minrcp_blog_wwl and https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/10-assign-configuration-profile?wt.mc_id=security_2minrcp_blog_wwl new device configuration profiles
  • https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/11-view-configuration-profiles?wt.mc_id=security_2minrcp_blog_wwl

 

Microsoft Azure Security Engineer

Part of the requirements for our https://docs.microsoft.com/learn/certifications/azure-security-engineer/?wt.mc_id=security_2minrcp_blog_wwl certification, this credential is designed for security engineers that implement and manage secure cloud solutions. We recently updated our four-part learning path series to prepare candidates for https://docs.microsoft.com/learn/certifications/exams/az-500?wt.mc_id=security_2minrcp_blog_wwl.  This learning path will provide instruction on how to:

  • https://docs.microsoft.com/learn/paths/manage-identity-access/?wt.mc_id=security_2minrcp_blog_wwl
  • https://docs.microsoft.com/learn/paths/implement-platform-protection/?wt.mc_id=security_2minrcp_blog_wwl 
  • https://docs.microsoft.com/learn/paths/secure-your-data-applications/?wt.mc_id=security_2minrcp_blog_wwl 
  • https://docs.microsoft.com/learn/paths/manage-security-operation/?wt.mc_id=security_2minrcp_blog_wwl

 

Microsoft Cybersecurity Architect

If you have expertise in designing and evolving all aspects of your organization’s cybersecurity strategy, our new https://docs.microsoft.com/learn/certifications/cybersecurity-architect-expert/?wt.mc_id=security_2minrcp_blog_wwl certification could be right for you. We recently released a new four-part learning path series to prepare you for https://docs.microsoft.com/learn/certifications/exams/sc-100?wt.mc_id=security_2minrcp_blog_wwl. This learning path covers how to:

  • https://docs.microsoft.com/learn/paths/sc-100-design-zero-trust-strategy-architecture/?wt.mc_id=security_2minrcp_blog_wwl 
  • https://docs.microsoft.com/learn/paths/sc-100-evaluate-governance-risk-compliance/?wt.mc_id=security_2minrcp_blog_wwl
  • https://docs.microsoft.com/learn/paths/sc-100-design-security-for-infrastructure/?wt.mc_id=security_2minrcp_blog_wwl 
  • https://docs.microsoft.com/learn/paths/sc-100-design-strategy-for-data-applications/?wt.mc_id=security_2minrcp_blog_wwl 

 

We’re excited to hear about how our content is helping you advance your skills, technical expertise, or career progression. Be sure to check out our https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWREfA?wt.mc_id=security_2minrcp_blog_wwl to get an overview of all our role-based credentials.

Updated Jun 22, 2022
Version 1.0
No CommentsBe the first to comment