- Learn how to prepare Microsoft Entra ID for device management and implement various device enrollment methods in Microsoft Intune.
By the end of this module, you'll be able to:
- Configure Microsoft Entra ID roles and licensing for device management
- Prepare your tenant with groups and settings for device onboarding
- Choose and explain appropriate enrollment methods for different scenarios
- Understand the prerequisites and readiness steps for device enrollment
- Learn how to enroll devices in Microsoft Intune and validate successful enrollment using portal tools and troubleshooting techniques.
By the end of this module, you'll be able to:
- Enroll a Windows device in Microsoft Intune using manual enrollment
- Validate device join status and management connectivity
- Configure platform and ownership restrictions for enrollment
- Troubleshoot common device enrollment and synchronization issues
- Learn how to configure and secure devices using Microsoft Intune configuration profiles, compliance policies, and dynamic group targeting.
By the end of this module, you'll be able to:
- Create and assign device configuration profiles to manage device settings
- Define and apply compliance policies to enforce security requirements
- Target policies using dynamic groups and assignment filters
- Validate policy application and monitor compliance status
- Automate remediation for noncompliant devices using scripts
- Learn how to protect organizational data with app protection policies and control resource access using Conditional Access policies integrated with device compliance.
By the end of this module, you'll be able to:
- Create and assign app protection policies to secure data on managed and unmanaged devices
- Configure Microsoft Entra Conditional Access policies to control resource access
- Integrate device compliance with Conditional Access for automated access control
- Monitor app protection and Conditional Access policy effectiveness
- Troubleshoot common data protection and access control issues
- Learn how to deploy security baselines, onboard devices to Microsoft Defender for Endpoint, configure attack surface reduction rules, and monitor security posture across your organization.
By the end of this module, you'll be able to:
- Deploy security baseline templates to enforce Microsoft's recommended security configurations
- Onboard Windows devices to Microsoft Defender for Endpoint for advanced threat protection
- Configure attack surface reduction (ASR) rules to prevent common attack vectors
- Enable exploit protection and controlled folder access to defend against ransomware
- Monitor security posture and investigate security incidents using Defender and Intune reports
- Troubleshoot common security baseline and Defender onboarding issues
- Learn how to use Microsoft Security Copilot to investigate security incidents, troubleshoot device issues, and accelerate response workflows using AI-powered insights.
By the end of this module, you'll be able to:
- Describe Microsoft Security Copilot capabilities and integration with Intune and Defender
- Use natural language prompts to investigate security incidents and device issues
- Leverage Copilot in Intune to troubleshoot device problems and analyze compliance
- Analyze attack timelines and generate incident summaries with Copilot in Defender
- Generate remediation recommendations using Copilot's AI-powered guidance
- Apply best practices for effective prompting and AI-assisted security operations
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Prepare Microsoft Entra ID and Intune for device management
- Introduction
- Set up Microsoft Entra ID roles and licensing
- Configure your tenant for device onboarding
- Choose and explain enrollment methods
- Knowledge check
- Summary
- Enroll and validate devices with Microsoft Intune
- Introduction
- Exercise: Enroll a device
- Validate device join and management
- Apply platform and ownership restrictions
- Troubleshoot device enrollment
- Knowledge check
- Summary
- Configure and secure devices with Microsoft Intune policies
- Introduction
- Create and assign configuration profiles
- Create and assign compliance policies
- Target policies with dynamic groups
- Exercise - Assign and validate device policies
- Automate remediation for noncompliance
- Knowledge check
- Summary
- Protect data and control access with Microsoft Intune and Conditional Access
- Introduction
- Protect organizational data with app protection policies
- Control resource access with Conditional Access policies
- Exercise - Protect data and control access with policies
- Knowledge check
- Summary
- Harden endpoints and monitor security with Microsoft Intune and Defender for Endpoint
- Introduction
- Harden device security with security baselines
- Enable advanced threat protection with Microsoft Defender for Endpoint
- Prevent exploitation with attack surface reduction
- Exercise - Harden and monitor endpoints with security policies
- Knowledge check
- Summary
- Accelerate endpoint remediation and response with Microsoft Security Copilot
- Introduction
- Microsoft Security Copilot overview
- Investigate security incidents with Copilot
- Device troubleshooting with Copilot in Intune
- Exercise: Investigate and respond with Security Copilot
- Knowledge check
- Summary