We may earn an affiliate commission when you visit our partners.
Greg Shields

Understand the device configuration and endpoint protection features that you should -- and shouldn't -- implement via MECM in this course.

Read more

Understand the device configuration and endpoint protection features that you should -- and shouldn't -- implement via MECM in this course.

Although MECM has lived a longer lifecycle than Intune, along with that long history comes a few legacy approaches to performing certain tasks. This course on device configuration may seem a little strange, because significant portions of the course are all about tasks that you ... shouldn't ... do in Configuration Manager. For many of today's device configuration and endpoint protection activities, Microsoft Intune simply offers a far superior solution. That said though, understanding where these configurations exist in MECM, and which ones you should enable versus those you can safely ignore is the mission for this course.

In this eleventh course out of sixteen, Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM, you'll start by exploring the options in MECM that exist for deploying device configurations to clients. Some of these, perhaps not surprisingly, involve technologies that have nothing to do with MECM at all, while others involve approaches that are better served through Intune's more MDM-like architecture. Next, you'll look at the endpoint protection policies in MECM, including which ones remain relevant for configuring via MECM today versus those better delivered from the Azure cloud.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Introduction
Configure Devices with MECM
Configure Endpoint Protection Policies with MECM
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills used by endpoint protection managers
Taught by Greg Shields, an expert in endpoint protection
Examines device configuration options in depth
Covers legacy device configuration approaches
Could benefit from more hands-on labs and interactive materials
Requires learners to have experience with endpoint protection and device configuration

Save this course

Save Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM with these activities:
Review device management concepts
Review foundational concepts of device management to strengthen understanding of course materials.
Browse courses on Device Management
Show steps
  • Read articles or blog posts on device management best practices.
  • Review documentation on device management tools.
  • Attend a webinar or online course on device management.
Participate in a peer discussion forum
Engage with peers in discussions to share knowledge, insights, and best practices.
Show steps
  • Join a discussion forum or online community.
  • Participate in discussions, ask questions, and provide answers.
  • Collaborate with peers on device configuration solutions.
Configure device settings using Configuration Manager
Follow guided tutorials to gain hands-on experience configuring device settings.
Show steps
  • Follow a tutorial on creating and deploying a device configuration profile.
  • Configure settings for operating system updates, security policies, and remote management.
  • Test the configuration profiles on a test device.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend an industry conference or webinar on device management
Connect with industry experts, learn about the latest trends, and gain insights from real-world case studies.
Show steps
  • Find an industry conference or webinar related to device management.
  • Register for the event and attend the sessions.
  • Network with attendees and learn from their experiences.
Troubleshoot device configuration issues
Practice troubleshooting common device configuration issues to enhance problem-solving skills.
Show steps
  • Review common device configuration errors and their solutions.
  • Simulate device configuration issues in a test environment.
  • Troubleshoot and resolve the simulated issues.
Participate in a device management hackathon
Challenge yourself and collaborate with others to solve device management problems in a competitive environment.
Show steps
  • Find a device management hackathon and register a team.
  • Develop innovative solutions to the challenges presented.
  • Present your solution and compete for prizes and recognition.
Develop a device configuration plan
Create a comprehensive plan for implementing and managing device configurations in a real-world scenario.
Show steps
  • Identify business requirements and device configuration needs.
  • Design and document the device configuration plan.
  • Test and validate the plan before implementation.
Mentor a junior device management professional
Share your expertise and foster the growth of others in the field of device management.
Show steps
  • Identify a junior professional seeking mentorship.
  • Provide guidance on device management concepts, best practices, and career development.
  • Collaborate on projects and provide feedback to support their growth.

Career center

Learners who complete Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM will develop knowledge and skills that may be useful to these careers:
Systems Administrator
Systems Administrators manage and maintain computer systems, including servers, desktops, and laptops. They also ensure that systems are secure and reliable, and that they meet the needs of the organization. This course can help Systems Administrators learn how to configure and manage device configuration and endpoint protection policies.
IT Systems Analyst
IT Systems Analysts design, develop, and implement computer systems. They also ensure that systems are secure and reliable, and that they meet the needs of the organization. This course can help IT Systems Analysts understand how to configure and manage device configuration and endpoint protection policies.
Data Security Analyst
Data Security Analysts protect sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help Data Security Analysts understand how to configure and manage device configuration and endpoint protection policies.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. They also monitor and respond to security threats. This course can provide Network Security Engineers with an understanding of device configuration and endpoint protection policies.
IT Systems Administrator
IT Systems Administrators manage and maintain computer systems, including servers, desktops, and laptops. They also ensure that systems are secure and reliable, and that they meet the needs of the organization. This course can help IT Systems Administrators learn how to configure and manage device configuration and endpoint protection policies.
Network Administrator
Network Administrators manage and maintain computer networks, including local area networks (LANs), wide area networks (WANs), and wireless networks. They also ensure that networks are secure and reliable, and that they meet the needs of the organization. This course can help Network Administrators learn how to configure and manage device configuration and endpoint protection policies.
IT Security Manager
IT Security Managers plan and implement security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help IT Security Managers understand how to configure and manage device configuration and endpoint protection policies.
Cloud Architect
Cloud Architects design, build, and manage cloud computing systems. They also ensure that cloud systems are secure and reliable, and that they meet the needs of the organization. This course can help Cloud Architects understand how to configure and manage device configuration and endpoint protection in the cloud.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help teach Security Analysts how to configure and manage endpoint protection policies.
IT Risk Manager
IT Risk Managers identify, assess, and mitigate IT risks. This course can help IT Risk Managers understand how to configure and manage device configuration and endpoint protection policies.
IT Security Consultant
IT Security Consultants provide guidance and advice to organizations on how to improve their IT security posture. This course can help IT Security Consultants understand how to configure and manage device configuration and endpoint protection policies.
IT Project Manager
IT Project Managers plan, organize, and direct IT projects. They also ensure that projects are completed on time, within budget, and to the required quality standards. This course can provide IT Project Managers with a better understanding of device configuration and endpoint protection.
Information Technology (IT) Project Manager
IT Project Managers plan, organize, and direct IT projects. They also ensure that projects are completed on time, within budget, and to the required quality standards. This course can provide IT Project Managers with a better understanding of device configuration and endpoint protection.
Information Technology (IT) Auditor
IT Auditors evaluate an organization's IT systems and controls to ensure that they are secure and compliant with regulations. This course can help IT Auditors understand how to configure and manage device configuration and endpoint protection policies.
Computer Network Architect
Computer Network Architects design and build data networks, including local area networks (LANs), wide area networks (WANs), and wireless networks. They also ensure that networks are secure and reliable, and that they meet the needs of the organization. This course can help Network Architects design and implement network security policies and procedures.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM.
Offers a comprehensive guide to Microsoft Endpoint Manager Endpoint Protection, providing in-depth explanations of its features and how to use them effectively. It covers endpoint protection policies, antivirus and antimalware configurations, threat detection and response, and real-world implementation scenarios, serving as a valuable resource for IT professionals and security practitioners.
Serves as a comprehensive technical reference guide for System Center Configuration Manager, providing detailed information on its architecture, components, and features. It covers device management, operating system deployment, software distribution, security patching, and more, offering both theoretical knowledge and practical guidance.
Provides a comprehensive overview of System Center Configuration Manager (SCCM). It covers topics such as deploying and managing SCCM, configuring SCCM settings, and protecting devices from threats.
Provides a comprehensive overview of advanced administration with System Center Configuration Manager (SCCM). It covers topics such as managing updates, managing applications, and managing devices.
Provides a comprehensive overview of reporting and analytics with System Center Configuration Manager (SCCM). It covers topics such as generating reports, creating dashboards, and using analytics to improve device management.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Endpoint Manager: Device Configuration and Endpoint Protection with MECM.
Microsoft Endpoint Manager: Device Configuration and...
Most relevant
Microsoft Endpoint Manager: Compliance Policies with MECM...
Most relevant
Microsoft Endpoint Manager: Introduction and Lab...
Most relevant
Microsoft Endpoint Manager: Deploy Applications with...
Most relevant
Microsoft Endpoint Manager: Intune Co-management with...
Most relevant
Windows Endpoint Administration: Manage Applications
Most relevant
Microsoft Endpoint Manager: Windows Updates and Servicing...
Most relevant
Managing iOS and Android Mobile Devices with Microsoft...
Most relevant
Microsoft Endpoint Manager: Package Software for...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser