Microsoft 365 Endpoint Administrator (MD-102)

The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.
$2,995.00
Select Upcoming Date
  • Dec 02, 2024 - Dec 06, 2024
    5 Days - Live Online - PST
    08:00 AM - 04:00 PM PST
    Guaranteed To Run
The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.

More Information:

  • Learning Style: Virtual
  • Provider: Microsoft
  • Difficulty: Intermediate
  • Course Duration: 5 Days
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Course Information

If you enroll in this course at the listed price, you receive a Free Official Exam Voucher for the MD-102 Exam. This course does not include Exam Voucher if enrolled within the Master Subscription, however, you can request to purchase the Official Exam Voucher separately.

About this Course:

The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.

Course Objectives:

  • Describe the benefits of Modern Management.
  • Explain the enterprise desktop life-cycle model.
  • Describe considerations for planning hardware strategies.
  • Describe considerations for post-deployment and retirement.
  • Explain the differences between the different editions of Windows.
  • Select the most suitable Windows device for your needs.
  • Describe the minimum recommended hardware requirements for installing Windows 11
  • Describe RBAC and user roles in Azure AD.
  • Create and manage users in Azure AD.
  • Create and manage groups in Azure AD.
  • Use Windows PowerShell cmdlets to manage Azure AD.
  • Describe how you can synchronize objects from AD DS to Azure AD.
  • Describe Microsoft Endpoint Manager.
  • Understand the advantages of managing a client with Configuration Manager.
  • Deploy the Configuration Manager client.
  • Monitor the Configuration Manager client.
  • Manage Configuration Manager devices.
  • Describe Microsoft Endpoint Manager.
  • Understand the advantages of managing a client with Configuration Manager.
  • Deploy the Configuration Manager client.
  • Monitor the Configuration Manager client.
  • Manage Configuration Manager devices.
  • Prepare Microsoft Intune for device enrollment.
  • Configure Microsoft Intune for automatic enrollment.
  • Explain how to enroll Windows, Android and iOS devices in Intune.
  • Explain when and how to use Intune Enrollment Manager.
  • Understand how to monitor and perform remote actions on enrolled devices.
  • Describe the various types of device profiles in Intune.
  • Explain the difference between built-in and custom profiles.
  • Create and manage profiles.
  • Monitor the assignments of profiles.
  • Understand how profiles are synchronized and how to manually force synchronization.
  • Use PowerShell to execute and monitor scripts on devices.
  • Explain the various user profile types that exist in Windows.
  • Describe how a user profile works.
  • Configure user profiles to conserve space.
  • Explain how to deploy and configure Folder Redirection.
  • Explain Enterprise State Roaming.
  • Configure Enterprise State Roaming for Azure AD devices.
  • Explain Mobile Application Management
  • Understand application considerations in MAM
  • Explain how to use Configuration Manager for MAM
  • Use Intune for MAM
  • Implement and manage MAM policies
  • Explain how to deploy applications using Intune and Configuration Manager
  • Learn how to deploy applications using Group Policy
  • Understand Microsoft Store Apps
  • Learn how to deploy apps using Microsoft Store Apps
  • Learn how to configure Microsoft Store Apps
  • Explain how to manage apps in Intune
  • Understand how to manage apps on non-enrolled devices
  • Understand how to deploy Microsoft 365 Apps using Intune
  • Learn how to configure and manage IE mode in Microsoft Edge
  • Learn about app inventory options in Intune
  • Describe Windows Hello for Business
  • Describe Windows Hello deployment and management
  • Describe Azure AD Identity Protection
  • Describe and manage self-service password reset in Azure AD
  • Describe and manage multi-factor authentication
  • Describe how you can access corporate resources
  • Describe VPN types and configuration
  • Describe Always On VPN
  • Describe how to configure Always On VPN
  • Describe device compliance policy
  • Deploy a device compliance policy
  • Describe conditional access
  • Create conditional access policies
  • Generate inventory reports and Compliance reports using Microsoft Intune
  • Report and monitor device compliance
  • Create custom reports using the Intune Data Warehouse
  • Use the Microsoft Graph API for building custom reports
  • Describe Windows Information Protection
  • Plan for Windows Information Protection usage
  • Implement and use Windows Information Protection
  • Describe the Encrypting File System (EFS)
  • Describe BitLocker
  • Describe Microsoft Defender for Endpoint
  • Describe key capabilities of Microsoft Defender for Endpoint
  • Describe Microsoft Defender Application Guard
  • Describe Microsoft Defender Exploit Guard
  • Describe Windows Defender System Guard
  • Describe Windows Security capabilities
  • Describe Windows Defender Credential Guard
  • Manage Microsoft Defender Antivirus
  • Manage Windows Defender Firewall
  • Manage Windows Defender Firewall with Advanced Security
  • Describe Microsoft Defender for Cloud Apps
  • Plan for Microsoft Defender for Cloud Apps usage
  • Implement and use Microsoft Defender for Cloud Apps
  • Describe the guidelines for an effective enterprise desktop deployment.
  • Explain how to assess the current environment.
  • Describe the tools that you can use to assess your current environment.
  • Describe the methods of identifying and mitigating application compatibility issues.
  • Explain considerations for planning a phased rollout.
  • Describe the fundamentals of using images in traditional deployment methods.
  • Describe the key benefits, limitations, and decisions when planning a deployment of - Windows using Microsoft Deployment Toolkit (MDT).
  • Describe how Configuration Manager builds upon MDT and how both can work in harmony.
  • Explain the different options and considerations when choosing the user interaction experience during deployment, and which methods and tools support these experiences.
  • Describe the capabilities of Configuration Manager.
  • Describe the key components of Configuration Manager.
  • Describe how to troubleshoot Configuration Manager deployments.
  • Explain the benefits of modern deployment for new devices.
  • Describe the process of preparing for an Autopilot deployment.
  • Describe the process of registering devices in Autopilot.
  • Describe the different methods and scenarios of Autopilot deployments.
  • Describe how to troubleshoot common Autopilot issues.
  • Describe the process of deployment using traditional methods.
  • Describe how Subscription Activation works.
  • Describe the benefits of Provisioning Packages.
  • Explain how Windows Configuration Designer creates Provisioning Packages.
  • Describe the benefits of using MDM enrollment with Azure AD join.
  • Identify usage scenarios for Azure AD join.
  • Identify workloads that you can transition to Intune.
  • Identify prerequisites for co-management.
  • Identify considerations for transitioning to modern management.
  • Plan a transition to modern management using existing technologies.
  • Plan a transition to modern management using Microsoft Intune.
  • Describe the key features of Windows 365
  • Describe the Windows 365 management experience
  • Describe the Windows 365 security model
  • Describe the Windows 365 deployment options
  • Describe the Windows 365 licensing model
  • Describe the key features of Azure Virtual Desktop
  • Describe the Azure Virtual Desktop management experience
  • Describe the Azure Virtual Desktop security model
  • Describe the Azure Virtual Desktop deployment options

Audience:

The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies.

Prerequisites:

The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices.

Outline

Credly Badge

Hit button to validate captcha