In this course| students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management| co-management approaches| and Microsoft Intune integration. It covers app deployment| management of browser-based applications| and key security concepts such as authentication| identities| access| and compliance policies. Technologies like Azure Active Directory| Azure Information Protection| and Microsoft Defender for Endpoint are explored to protect devices and data.
Learning Objectives
Course Details
Learning objectives:
Explain the differences between the different editions of Windows.
Select the most suitable Windows device for your needs.
Describe the minimum recommended hardware requirements for installing Windows 11.
Explore Windows Editions
This module covers Windows OS editions| features| and installation methods. earners gain a deeper understanding of the available editions and corresponding installation processes.
Examine Windows client editions and capabilities
Select client edition
Examine hardware requirements
Explore endpoint management - Explore the Enterprise Desktop
Examine benefits of modern management
Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement
Deploy and update applications -
Deploy applications with Intune
Add apps to Intune
Manage Win32 apps with Intune
Deploy applications with Configuration Manager
Deploying applications with Group Policy
Assign and publish software
Explore Microsoft Store for Business
Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune
Assign apps to company employees
Manage endpoint security: Deploy device data protection
Explore Windows Information Protection
Plan Windows Information Protection
Implement and use Windows Information Protection
Explore Encrypting File System in Windows client| Explore BitLocker
Manage Microsoft Defender for Endpoint
Explore Microsoft Defender for Endpoint
Examine key capabilities of Microsoft Defender for Endpoint
Explore Windows Defender Application Control and Device Guard
Explore Microsoft Defender Application| Exploit and System Guard
Manage Microsoft Defender in Windows client
Manage Microsoft Defender for Cloud Apps
Examine application management: Execute mobile application management
Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune
Deploy and update applications| Deploy applications with Intune| Add apps to Intune | Manage Win32 apps with Intune
Deploy applications with Configuration Manager| and with Group Policy
Assign and publish software| Explore Microsoft Store for Business| Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune| Assign apps to company employees
Administer endpoint applications| Manage apps with Intune| and on non-enrolled devices
Additional Microsoft 365 Apps Deployment Tools|
Configure Microsoft Edge Internet Explorer mode| App Inventory Review
Explore the Enterprise Desktop
Examine benefits of modern management
Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement
Manage authentication and compliance
Protect identities in Azure Active Directory
Deploy Windows Hello| Manage Windows Hello for Business
Explore Azure AD identity protection|
Manage self-service password reset in Azure AD| Implement multi-factor authentication
Enable organizational access| Enable access to organization resources
Explore VPN types and configuration| Explore Always On VPN
Deploy Always On VPN
Implement device compliance| Protect access to resources using Intune| Explore device compliance policy
Deploy a device compliance policy| Explore conditional access| Create conditional access policies
Generate inventory and compliance reports
Report enrolled devices inventory in Intune| Monitor and report device compliance
Build custom Intune inventory reports| Access Intune using Microsoft Graph API
Manage Windows 365
Explore Windows 365
Configure Windows 365
Administer Windows 365
Configure profiles for user and devices
Execute device profiles| Explore Intune device profiles| Create device profiles| Create a custom device profile
Oversee device profiles| Monitor device profiles in Intune|
Manage device sync in Intune| Manage devices in Intune using scripts
Maintain user profiles| Examine user profile|
Explore user profile types| Examine options for minimizing user profile size
Deploy and configure folder redirection| Sync user state with Enterprise State Roaming
Configure Enterprise State Roaming in Azure
Execute device enrollment
Manage device authentication| Describe Azure AD join| Examine Azure AD join prerequisites limitations and benefits
Join devices to Azure AD| Manage devices joined to Azure AD
Enroll devices using Microsoft Configuration Manager
Deploy the Microsoft Configuration Manager client| Monitor the Microsoft Configuration Manager client
Manage the Microsoft Configuration Manager client
Enroll devices using Microsoft Intune
Manage mobile devices with Intune| Enable mobile device management
Explain considerations for device enrollment
Manage corporate enrollment policy| Enroll Windows devices in Intune| Enroll Android devices in Intune
Enroll iOS devices in Intune| Explore device enrollment manager
Monitor device enrollment| Manage devices remotely
Implement threat protection by using Microsoft 365 Defender
Explore threat intelligence in Microsoft 365 Defender
Implement app protection by using Microsoft Defender for Cloud Apps
Implement endpoint protection by using Microsoft Defender for Endpoint
Implement threat protection by using Microsoft Defender for Office 365
Execute mobile application management
Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune
Deploy using on-premises based tools
Assess deployment readiness
Deploy using the Microsoft Deployment Toolkit
Deploy using Microsoft Configuration Manager
Assess deployment readiness
Examine deployment guidelines
Explore readiness tools
Assess application compatibility
Explore tools for application compatibility mitigation
Prepare network and directory for deployment
Plan a pilot
Deploy using cloud based tools
Deploy Devices using Windows Autopilot
Implement dynamic deployment methods
Plan a transition to modern endpoint management
Manage Windows 365
Manage Azure Virtual Desktop
Implement device compliance
Protect access to resources using Intune
Explore device compliance policy
Deploy a device compliance policy
Explore conditional access
Create conditional access policies
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):