Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.
For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.
For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.