Description
Course info
Level
Intermediate
Updated
Jun 17, 2020
Duration
1h 50m
Description

In this course, Protecting Devices and Applications in Microsoft 365, you’ll learn to protect your Windows 10 and mobile devices from advanced threats using Microsoft applications and utilities. First, you’ll explore Microsoft Defender application protection features. Next, you’ll discover encryption and secure booting procedures. Finally, you’ll learn how to create policies to protect Windows 10 and mobile devices in your environment. When you’re finished with this course, you’ll have the skills and knowledge of Windows security needed to protect your endpoints and pass the device and application protection portion of the MS-500 certification exam.

About the author
About the author

Professor Robert McMillen (MCT, MCSE) has over 20 years of experience in IT Consulting. He teaches at two local colleges and hosts the weekly All Tech Radio show in the Portland area.

More from the author
Setting up a Forensic Workstation
Intermediate
1h 2m
Nov 19, 2020
More courses by Robert McMillen
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hello. My name is Robert MacMillan. I would like to welcome you to my course, implement and manage device and application protection. I'm a Microsoft certified trainer, consultant and college instructor. This course we discover how to protect Windows and mobile devices using built in utilities and features in Windows 10, as well as utilizing the cloud service from Microsoft, called In Tune in Tune can protect Windows, Mac Android and Apple IOS devices. Using policies and device configurations, you'll learn how to join a Windows and mobile device into in tune and how to configure and protect these devices through allowed features and how to allow only trusted applications. You'll also learn how to control Windows devices using group policy. I demonstrate how to properly configure a Windows Active Directory domain and forest in Microsoft Azure using hyper V virtual machines. And then I joined a Windows 10 computer to the domain. We then discover how to control and protected joined computers using apply group policy settings. By the end of this course, you'll be able to manage and protect Windows and mobile devices in your organization. I hope you'll join me and learning these great technologies from Microsoft in my course, implement and manage device and application protection