Companies Home Search Profile

Device and Application Protection in Microsoft 365

Focused View

Liam Cleary

1:09:27

17 View
  • 1. Introduction.mp4
    02:29
  • 2. Planning for Device and Application Protection.mp4
    13:59
  • 3. Configuring and Managing Exploit Protection.mp4
    08:44
  • 4. Configuring and Managing Windows Device Encryption.mp4
    13:15
  • 5. Configuring and Managing Non-Windows Device Encryption.mp4
    07:34
  • 6. Implementing Application Protection Policies.mp4
    11:23
  • 7. Configuring and Managing Device Compliance for Endpoint Security.mp4
    11:30
  • 8. Conclusion.mp4
    00:33
  • Description


    Microsoft 365 provides multiple features and services for connecting, managing, and protecting corporate data within devices. It is critical for you as an IT administrator to understand the features available to protect any device connecting to Microsoft 365 services. This lesson will focus on what you need to know and do to successfully manage different types of devices. At the end of this lesson, you will know the various options and when to use which component, service, or tool. We will also discuss some important things to note when working with devices.

    Learning Objectives

    • Plan for device and application protection
    • Configure and manage exploit protection
    • Configure and manage Windows device encryption
    • Configure and manage non-Windows device encryption
    • Implement application protection policies
    • Configure and manage device compliance for endpoint security

    Intended Audience

    This lesson is for people who want to become a Microsoft 365 Certified: Security Administrator Associate or are preparing to take the MS-500 exam.

    Prerequisites

    To get the most from this lesson, you should have a Microsoft 365 tenant and an account with Global Administrator access. You will also need a Microsoft Intune license and devices to test within the tenant, such as a phone, tablet, or Windows workstation.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Liam began his career as a trainer of all things computer-related. He quickly realized that programming, breaking, and hacking were much more fun. He spent the next few years working within core infrastructure and security services. He is the founder and owner of SharePlicity, a consulting company that focuses on all technology areas. His role within SharePlicity is to help organizations implement technology to enhance internal and external collaboration, document and records management, automate business processes, and security controls and protection. He is a Microsoft MVP and Microsoft Certified Trainer, focusing on architecture, security, and crossing the boundary into software development. Over the past few years, his specialty has been security in Microsoft 365 and its surrounding platforms. He can often be found at user groups or conferences, offering advice, spending time in the community, teaching his kids how to code, raspberry PI programming, hacking the planet, building Lego robots, or coaching soccer.
    Join thousands of users in achieving your personal goals through Cloud Academy. Score job-ready tech skills that you can practice in a real environment, without the risk of extra costs or making mistakes. It’s simply the smartest way to gain certifications and get career-ready.
    • language english
    • Training sessions 8
    • duration 1:09:27
    • Release Date 2024/04/27

    Courses related to Information Security

    Subtitle
    CISA (Certified Information Systems Auditor)
    LiveLessonsCISA (Certified Information Systems Auditor)
    12:17:41
    English subtitles
    06/07/2023
    Subtitle
    Secure Software Concepts for CSSLP By kevin-henry

    Courses related to Computer Network

    Courses related to Network Engineering