Companies Home Search Profile

Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM

Focused View

Greg Shields

57:54

40 View
  • 01. Course Overview.mp4
    02:06
  • 02. Introduction.mp4
    01:13
  • 03. Introduction.mp4
    03:02
  • 04. Understand Device Configuration Options with MECM.mp4
    07:36
  • 05. Configure Device Configuration Co-management Workload for MECM.mp4
    01:12
  • 06. Deploy Scripts from MECM Console.mp4
    04:55
  • 07. Deploy Scripts as Applications.mp4
    08:22
  • 08. Configure Special Use Compliance Profiles.mp4
    02:50
  • 09. Introduction.mp4
    03:18
  • 10. Configure an Endpoint Protection Point and Client Settings.mp4
    02:55
  • 11. Configure Endpoint Protection Alerts and Antimalware Policies.mp4
    04:02
  • 12. Configure Defender for Endpoint Onboarding Policies.mp4
    02:21
  • 13. Configure Windows Defender Firewall Exploit Guard Application Guard.mp4
    04:14
  • 14. Explore MECM Cloud Sync for Intune Endpoint Security Policies.mp4
    01:32
  • 15. Configure BitLocker Management Policy.mp4
    04:25
  • 16. Deploy BitLocker Portals.mp4
    03:51
  • Description


    Understand the device configuration and endpoint protection features that you should -- and shouldn't -- implement via MECM in this course.

    What You'll Learn?


      Although MECM has lived a longer lifecycle than Intune, along with that long history comes a few legacy approaches to performing certain tasks. This course on device configuration may seem a little strange, because significant portions of the course are all about tasks that you ... shouldn't ... do in Configuration Manager. For many of today's device configuration and endpoint protection activities, Microsoft Intune simply offers a far superior solution. That said though, understanding where these configurations exist in MECM, and which ones you should enable versus those you can safely ignore is the mission for this course.

      In this eleventh course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM, you'll start by exploring the options in MECM that exist for deploying device configurations to clients. Some of these, perhaps not surprisingly, involve technologies that have nothing to do with MECM at all, while others involve approaches that are better served through Intune's more MDM-like architecture. Next, you'll look at the endpoint protection policies in MECM, including which ones remain relevant for configuring via MECM today versus those better delivered from the Azure cloud.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Greg Shields
    Greg Shields
    Instructor's Courses
    Greg Shields is Sr. Director of IT Ops Skills at Pluralsight and formerly Principal Author Evangelist. Reach him on Twitter @ConcentratdGreg.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 16
    • duration 57:54
    • level average
    • Release Date 2023/12/15

    Courses related to Network Security

    Courses related to Computer Network