Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. VTEC Training Education Center
  4. MD-102T00 Microsoft 365 Endpoint Administrator

MD-102T00 Microsoft 365 Endpoint Administrator

In this course| students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management| co-management approaches| and Microsoft Intune integration. It covers app deployment| management of browser-based applications| and key security concepts such as authentication| identities| access| and compliance policies. Technologies like Azure Active Directory| Azure Information Protection| and Microsoft Defender for Endpoint are explored to protect devices and data.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
22361
Course Prerequisites

Students should have a basic understanding of computer networks and hardware concepts.
Students should have a basic understanding of OS and Application concepts.
Students should have experience with using Windows 11 or later.

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Federal Employee
Delivery Method
Classroom
Online, Instructor-Led
Online, Self-Paced
Course Location

67 Gorham Rd
Scarborough, ME 04074

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

Course Details
Learning objectives:
Explain the differences between the different editions of Windows.
Select the most suitable Windows device for your needs.
Describe the minimum recommended hardware requirements for installing Windows 11.
Explore Windows Editions
This module covers Windows OS editions| features| and installation methods. earners gain a deeper understanding of the available editions and corresponding installation processes.
Examine Windows client editions and capabilities
Select client edition
Examine hardware requirements
Explore endpoint management - Explore the Enterprise Desktop
Examine benefits of modern management
Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement
Deploy and update applications -
Deploy applications with Intune
Add apps to Intune
Manage Win32 apps with Intune
Deploy applications with Configuration Manager
Deploying applications with Group Policy
Assign and publish software
Explore Microsoft Store for Business
Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune
Assign apps to company employees
Manage endpoint security: Deploy device data protection
Explore Windows Information Protection
Plan Windows Information Protection
Implement and use Windows Information Protection
Explore Encrypting File System in Windows client| Explore BitLocker
Manage Microsoft Defender for Endpoint
Explore Microsoft Defender for Endpoint
Examine key capabilities of Microsoft Defender for Endpoint
Explore Windows Defender Application Control and Device Guard
Explore Microsoft Defender Application| Exploit and System Guard
Manage Microsoft Defender in Windows client
Manage Microsoft Defender for Cloud Apps
Examine application management: Execute mobile application management
Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune
Deploy and update applications| Deploy applications with Intune| Add apps to Intune | Manage Win32 apps with Intune
Deploy applications with Configuration Manager| and with Group Policy
Assign and publish software| Explore Microsoft Store for Business| Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune| Assign apps to company employees
Administer endpoint applications| Manage apps with Intune| and on non-enrolled devices
Additional Microsoft 365 Apps Deployment Tools|
Configure Microsoft Edge Internet Explorer mode| App Inventory Review
Explore the Enterprise Desktop
Examine benefits of modern management
Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement
Manage authentication and compliance
Protect identities in Azure Active Directory
Deploy Windows Hello| Manage Windows Hello for Business
Explore Azure AD identity protection|
Manage self-service password reset in Azure AD| Implement multi-factor authentication
Enable organizational access| Enable access to organization resources
Explore VPN types and configuration| Explore Always On VPN
Deploy Always On VPN
Implement device compliance| Protect access to resources using Intune| Explore device compliance policy
Deploy a device compliance policy| Explore conditional access| Create conditional access policies
Generate inventory and compliance reports
Report enrolled devices inventory in Intune| Monitor and report device compliance
Build custom Intune inventory reports| Access Intune using Microsoft Graph API
Manage Windows 365
Explore Windows 365
Configure Windows 365
Administer Windows 365
Configure profiles for user and devices
Execute device profiles| Explore Intune device profiles| Create device profiles| Create a custom device profile
Oversee device profiles| Monitor device profiles in Intune|
Manage device sync in Intune| Manage devices in Intune using scripts
Maintain user profiles| Examine user profile|
Explore user profile types| Examine options for minimizing user profile size
Deploy and configure folder redirection| Sync user state with Enterprise State Roaming
Configure Enterprise State Roaming in Azure
Execute device enrollment
Manage device authentication| Describe Azure AD join| Examine Azure AD join prerequisites limitations and benefits
Join devices to Azure AD| Manage devices joined to Azure AD
Enroll devices using Microsoft Configuration Manager
Deploy the Microsoft Configuration Manager client| Monitor the Microsoft Configuration Manager client
Manage the Microsoft Configuration Manager client
Enroll devices using Microsoft Intune
Manage mobile devices with Intune| Enable mobile device management
Explain considerations for device enrollment
Manage corporate enrollment policy| Enroll Windows devices in Intune| Enroll Android devices in Intune
Enroll iOS devices in Intune| Explore device enrollment manager
Monitor device enrollment| Manage devices remotely
Implement threat protection by using Microsoft 365 Defender
Explore threat intelligence in Microsoft 365 Defender
Implement app protection by using Microsoft Defender for Cloud Apps
Implement endpoint protection by using Microsoft Defender for Endpoint
Implement threat protection by using Microsoft Defender for Office 365
Execute mobile application management
Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune
Deploy using on-premises based tools
Assess deployment readiness
Deploy using the Microsoft Deployment Toolkit
Deploy using Microsoft Configuration Manager
Assess deployment readiness
Examine deployment guidelines
Explore readiness tools
Assess application compatibility
Explore tools for application compatibility mitigation
Prepare network and directory for deployment
Plan a pilot
Deploy using cloud based tools
Deploy Devices using Windows Autopilot
Implement dynamic deployment methods
Plan a transition to modern endpoint management
Manage Windows 365
Manage Azure Virtual Desktop
Implement device compliance
Protect access to resources using Intune
Explore device compliance policy
Deploy a device compliance policy
Explore conditional access
Create conditional access policies

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: