We may earn an affiliate commission when you visit our partners.
Dean Ellerby

Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.

Read more

Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.

For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Configure Compliance Rules and Conditional Access Policies
Update Devices
Secure Devices
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Guides learners towards a strong foudnation in endpoint protection
Provides a strong exploration of Microsoft Intune capabilities
Teaches methods used by indusry professionals
Suitable for beginners new to endpoint protection
Focuses on skills relevant to cybersecurity
Taught by instructors with known expertise in the field

Save this course

Save Protect Windows Devices with Microsoft Intune to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Protect Windows Devices with Microsoft Intune with these activities:
Create a study guide
Summarizes and consolidates course materials, facilitating retention and recall
Show steps
  • Review course materials
  • Organize notes and assignments
  • Create an outline for the study guide
  • Fill in the outline with key concepts, definitions, and examples
Review Network Fundamentals
Review the basic principles of networking, the different network types, protocols, and components.
Browse courses on Networking Fundamentals
Show steps
  • Review OSI network model
  • Review difference between TCP and UDP protocols
Build a Windows VM using Azure
Reinforces understanding of creating and managing virtual machines in Azure
Browse courses on Azure
Show steps
  • Create an Azure subscription
  • Create a resource group
  • Create a virtual machine
  • Connect to the virtual machine
Five other activities
Expand to see all activities and additional details
Show all eight activities
Join a Windows user group or forum
Connect with other Windows professionals, ask questions, and learn from others.
Browse courses on Networking
Show steps
  • Identify relevant user groups or forums
  • Join the selected group or forum
  • Participate in discussions and ask questions
  • Contribute to the community by answering questions
Create a Microsoft Defender for Endpoint policy
Develops skills in configuring and managing endpoint security policies
Show steps
  • Open the Microsoft Defender Security Center
  • Create a new policy
  • Configure the policy settings
  • Assign the policy to devices
Create a security configuration baseline
Develops a plan for implementing security measures on a Windows deployment
Browse courses on Security Configuration
Show steps
  • Identify security requirements
  • Configure security settings in Intune
  • Deploy the configuration to devices
Configure and manage Intune in a test environment
Provides hands-on experience with Intune deployment and management
Show steps
  • Create an Intune trial subscription
  • Configure Intune settings
  • Enroll devices in Intune
  • Manage devices in Intune
Participate in Intune Hackathon
Challenges skills and knowledge in a competitive and collaborative environment
Show steps
  • Register for the Intune Hackathon
  • Form a team or participate individually
  • Develop and submit a solution
  • Receive feedback and learn from other participants

Career center

Learners who complete Protect Windows Devices with Microsoft Intune will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts implement and maintain security measures to protect their organization's computer networks and systems. In this role, you will need a deep understanding of network administration and security. This course can help enhance your skills in endpoint protection and security.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. This role also involves monitoring and responding to security breaches. This course can build a foundation in network security and help enhance your skills in endpoint protection and security.
Security Administrator
Security Administrators manage and maintain an organization's security infrastructure. This course can help enhance your skills in endpoint protection and security. This course offers a solid foundation in Windows security and updates.
Security Architect
Security Architects design and implement security solutions for their organization. This role often involves working with other IT professionals to ensure the organization's security measures are aligned with its business needs. This course can help enhance your skills in endpoint protection and security.
Security Analyst
Security Analysts monitor and analyze security data to identify and respond to threats. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
Security Consultant
Security Consultants provide security advice and guidance to organizations. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
Security Engineer
Security Engineers design, implement, and maintain security systems for their organization. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
Security Manager
Security Managers oversee the security of their organization's IT systems and networks. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
System Administrator
System Administrators manage and maintain computer systems and networks. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
Network Administrator
Network Administrators manage and maintain computer networks. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
Computer Systems Analyst
Computer Systems Analysts design, implement, and maintain computer systems. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
IT Manager
IT Managers oversee the IT department of their organization. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
IT Security Specialist
IT Security Specialists implement and maintain security measures to protect their organization's computer networks and systems. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
Computer Support Specialist
Computer Support Specialists provide technical support to computer users. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.
IT Auditor
IT Auditors evaluate the security of their organization's IT systems and networks. This course may be useful for developing the skills needed to protect Windows devices with Microsoft Intune.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Protect Windows Devices with Microsoft Intune.
While this book focuses on Windows 10, it provides valuable background knowledge for managing Windows devices. It covers topics such as operating system deployment, security configuration, and troubleshooting.
Comprehensive guide to Intune, covering all aspects of endpoint management, including device enrollment, configuration, security, and troubleshooting.
Provides a deep dive into the internals of Windows. While it's not specific to Intune, it provides valuable insights into the way that Windows works, which can be helpful for understanding how Intune can be used to manage and secure Windows devices.
Provides a comprehensive overview of security engineering. While it's not specific to Intune, it provides valuable insights into the broader context of security and how it can be used to design and build more secure systems.
Provides a comprehensive overview of Windows security from an attacker's perspective. While it's not specific to Intune, it provides valuable insights into the ways that attackers can exploit vulnerabilities in Windows systems.
This document provides best practices for securing Intune deployments. It covers topics such as device enrollment, policy management, and security settings. While it's not a comprehensive guide to Intune, it's a valuable resource for anyone looking to improve the security of their Intune environment.
Provides a unique perspective on cybersecurity by focusing on the human element of security. While it's not specific to Intune, it provides valuable insights into the ways that attackers can exploit human weaknesses to compromise systems.
Provides a comprehensive overview of cybersecurity. While it's not specific to Intune, it provides valuable insights into the broader context of cybersecurity and how it can be used to protect an organization's IT infrastructure.
Provides a comprehensive overview of security in the cloud. While it's not specific to Intune, it provides valuable insights into the broader context of cloud security and how it can be used to improve the overall security of an organization's IT infrastructure.
Provides a comprehensive overview of Windows Server administration, including Intune's role in endpoint security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Protect Windows Devices with Microsoft Intune.
Windows Endpoint Administration: Manage, Maintain, and...
Most relevant
Managing iOS and Android Mobile Devices with Microsoft...
Most relevant
Windows Endpoint Administration: Manage Applications
Most relevant
Manage Windows Apps with Microsoft Intune
Most relevant
Configure Windows Devices with Microsoft Intune
Most relevant
Microsoft Endpoint Manager: Windows Updates and Servicing...
Most relevant
Introduction to Microsoft Intune
Most relevant
Check Point Jump Start: Harmony Endpoint Security
Most relevant
Support and Retire Windows Devices with Microsoft Intune
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser