We may earn an affiliate commission when you visit our partners.
Glenn Weadock

Three big jobs for an endpoint administrator are setting up local and cloud identities for users and groups; managing authentication for those identities; and setting up compliance criteria to secure access to apps. This course explores all three.

Read more

Three big jobs for an endpoint administrator are setting up local and cloud identities for users and groups; managing authentication for those identities; and setting up compliance criteria to secure access to apps. This course explores all three.

Windows client is installed and remote administrative access has been set up; what comes next? In this course, Windows Endpoint Administration: Manage Identity and Compliance, you will gain the ability to create and manage user and group accounts and configure systems with cloud-based policies to determine compliance and access to apps. First, you will explore how to secure Windows identities through the use of password management, tokens, and biometric authentication. Next, you will learn to manage users and groups in a domain environment, whether on-premises Active Directory or cloud-based Azure AD. Finally, you will see how to use Intune to build policies that evaluate device compliance with corporate configuration standards, and restrict access to applications based on compliance. When you are finished with this course, you will have the skills and knowledge to set up Windows 10 and 11 successfully for identity management, device compliance, and conditional access.

Enroll now

What's inside

Syllabus

Course Overview
User Authentication in Windows
Managing Users and Groups
Policy Fundamentals
Read more
Compliance Policies and Conditional Access

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers user authentication, which is standard in enterprise networks
Provides hands-on experience with industry-standard software
Instructors are recognized for their work in Windows Endpoint Administration
Develops skills and knowledge highly relevant to system administration
Can be taken as part of an extensive career-building track
"Policy Fundamentals" module covers core concepts for managing access

Save this course

Save Windows Endpoint Administration: Manage Identity and Compliance to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Windows Endpoint Administration: Manage Identity and Compliance with these activities:
Review basic command line tools
Refreshing basic command line tools will improve user's ability to interact effectively with the Linux environment
Browse courses on Command Line Tools
Show steps
  • Open a terminal emulator
  • Review basic commands like ls, cd, mkdir, and rm
Find a Windows Endpoint Administration Mentor
Find a mentor who can provide guidance and support on Windows endpoint administration.
Browse courses on Mentorship
Show steps
  • Identify potential mentors
  • Reach out to mentors and introduce yourself
  • Build a relationship and discuss your goals
Review Networking Fundamentals
Review networking fundamentals to enhance understanding of Windows endpoint connectivity.
Browse courses on Networking
Show steps
  • Review network topologies
  • Review network protocols
  • Review network security
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Use burst mode to take sequence of photos
Practice using burst mode will improve user's skills in capturing the perfect moment
Show steps
  • Open the camera app and swipe right to Photo mode
  • Tap the Burst mode icon
  • Press and hold the shutter button to take photos in rapid succession
Create a list of your favorite Linux commands and their uses
Creating a list of favorite Linux commands will provide quick reference guidelines while working with the Linux environment
Browse courses on Linux Commands
Show steps
  • Open a terminal emulator
  • Find and list your favorite commands
  • Write a short description of each command and its uses
Windows Client Administration Compilation
Create a compilation of notes, resources, and tools related to Windows client management.
Browse courses on System Administration
Show steps
  • Gather notes and resources from the course
  • Search for additional resources and tools online
  • Organize the compilation into logical sections
  • Review the compilation regularly
Active Directory Management Practice
Practice managing users and groups in an Active Directory environment.
Show steps
  • Create a test Active Directory environment
  • Create and manage user accounts
  • Create and manage group accounts
  • Assign users and groups to permissions
Intune Policies for Compliance
Follow guided tutorials to learn how to create and configure Intune policies for device compliance.
Browse courses on Device Management
Show steps
  • Identify the specific compliance requirements
  • Create a new Intune policy
  • Configure the policy settings
  • Assign the policy to devices
  • Monitor the policy compliance
Windows Endpoint Identity Management Study Group
Form a study group with peers to discuss and explore Windows endpoint identity management.
Browse courses on Identity Management
Show steps
  • Find a group of peers with similar interests
  • Schedule regular study sessions
  • Discuss course topics and share knowledge
  • Work together on practice exercises
WSL GUI app connectivity with X server
By following these instructions, users will be able to run their favorite GUI apps within a WSL 2 environment
Show steps
  • Install Xming or VcXsrv on Windows and run it
  • Install and configure WSL2
  • Configure the WSL2 distribution
  • Launch your GUI app in the WSL2 Terminal
  • Connect to the X server from the WSL2 terminal
Manage Windows Endpoint Identities Project
Start a project to manage identities for a real-world Windows endpoint environment.
Browse courses on Identity Management
Show steps
  • Define the project scope and goals
  • Gather requirements and design the identity management solution
  • Implement the solution in a test environment
  • Deploy the solution in the production environment
  • Monitor and maintain the solution
Windows Endpoint Compliance Policy
Create a detailed compliance policy for managing Windows endpoint devices.
Browse courses on Compliance
Show steps
  • Identify the compliance requirements
  • Research and select the appropriate compliance controls
  • Draft the compliance policy
  • Review and finalize the policy
Create a blog post comparing and contrasting different Linux distros
This will walk users through the process of comparing and contrasting different Linux distros, providing deeper understanding of their features and use cases
Browse courses on Linux Distributions
Show steps
  • Identify the Linux distros to compare
  • Research and gather information about each distro
  • Organize the information into a table or chart
  • Write the blog post, highlighting the similarities and differences between the distros

Career center

Learners who complete Windows Endpoint Administration: Manage Identity and Compliance will develop knowledge and skills that may be useful to these careers:

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Windows Endpoint Administration: Manage Identity and Compliance.
Offers a guide to managing Windows Server security. While not specific to identity and compliance, it can be a valuable resource for learners who want to gain a broader understanding of Windows Server security.
Offers a practical guide to Windows Server 2016 Identity and Access Management. While the course focuses on Windows 10 and 11, this book can help offer a helpful background.
Provides a comprehensive overview of identity and access management (IAM). It covers topics such as identity governance, access management, and security. This book valuable resource for anyone who wants to learn more about IAM.
Provides a comprehensive overview of practical information security. It covers topics such as security principles, risk management, and incident response. This book valuable resource for anyone who wants to learn more about practical information security.
Provides a comprehensive overview of network security. It covers topics such as network security principles, network security threats, and network security countermeasures. This book valuable resource for anyone who wants to learn more about network security.
Provides a comprehensive overview of hacking techniques and countermeasures for Windows systems. It covers topics such as system hardening, vulnerability assessment, and penetration testing. This book valuable resource for anyone who wants to learn more about hacking techniques and countermeasures for Windows systems.
Provides a comprehensive overview of information security. It covers topics such as security principles, risk management, and incident response. This book valuable resource for anyone who wants to learn more about information security.
Provides a comprehensive overview of security engineering. It covers topics such as security principles, risk management, and incident response. This book valuable resource for anyone who wants to learn more about security engineering.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Windows Endpoint Administration: Manage Identity and Compliance.
Authentication and Authorization with AWS Identity and...
Most relevant
GitHub Enterprise
Most relevant
Microsoft 365 Administration: Implementing and Managing...
Most relevant
Microsoft Azure Solutions Architect: Implement an Azure...
Most relevant
Introduction to IT Security
Most relevant
Implementing Microsoft Azure Privileged Identity...
Most relevant
Ubuntu Linux Administration: User and Group Management
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Regulating Resource Usage Using Google Cloud IAM
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser