CODE: MCS_MD-102T00A
LÄNGE: 40 Hours (5 Tage)
PREIS: €2 590,00
In diesem Training lernen die Teilnehmenden, wie sie eine Endpunktbereitstellungsstrategie mithilfe moderner Bereitstellungsverfahren und der Anwendung von Updatestrategien planen und umsetzen.
Der Training behandelt wesentliche Elemente der modernen Verwaltung, Co-Management-Ansätze und die Microsoft Intune-Integration. Die App-Bereitstellung, die Verwaltung browserbasierter Anwendungen und wichtige Sicherheitskonzepte wie Authentifizierung, Identitäten, Zugriff und Compliancerichtlinien werden erläutert. Technologien wie Microsoft Entra ID, Azure Information Protection und Microsoft Defender for Endpoint werden erkundet, um Geräte und Daten zu schützen.
Microsoft 365-Endpunktadministrator*innen sind für die Bereitstellung, Konfiguration, den Schutz, die Verwaltung und die Überwachung von Geräten und Clientanwendungen in Unternehmen zuständig. Zu ihren Aufgaben gehört die Verwaltung von Identitäten, Zugriff, Richtlinien, Updates und Anwendungen.
Sie arbeiten mit Microsoft 365 Enterprise-Administrator*innen zusammen, um eine Gerätestrategie zu entwickeln und umzusetzen, die den Anforderungen einer modernen Organisation entspricht. Microsoft 365-Endpunktadministrator*innen sollten sich mit Microsoft 365-Workloads auskennen und über umfassende Kenntnisse und Erfahrungen in der Bereitstellung, Konfiguration und Wartung von Windows 11 und höher sowie Geräten mit anderen Betriebssystemen als Windows verfügen. Bei dieser Rolle liegt der Schwerpunkt auf Clouddiensten statt auf lokalen Verwaltungstechnologien.
Windows Grundlagen für Administratoren
oder
Windows Client Fundamentals
Explore the Enterprise Desktop
Examine benefits of modern management
Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement
Explore Windows Editions
Examine Windows client editions and capabilities
Select client edition
Examine hardware requirements
Understand Microsoft Entra ID
Examine Microsoft Entra ID
Compare Microsoft Entra ID and Active Directory Domain Services
Examine Microsoft Entra ID as a directory service for cloud apps
Compare Microsoft Entra ID P1 and P2 plans
Examine Microsoft Entra Domain Services
Manage Microsoft Entra identities
Examine RBAC and user roles in Microsoft Entra ID
Create and manage users in Microsoft Entra ID
Create and manage groups in Microsoft Entra ID
Manage Microsoft Entra objects with PowerShell
Synchronize objects from AD DS to Microsoft Entra ID
Manage device authentication
Describe Microsoft Entra join
Examine Microsoft Entra join prerequisites limitations and benefits
Join devices to Microsoft Entra ID
Manage devices joined to Microsoft Entra ID
Enroll devices using Microsoft Configuration Manager
Deploy the Microsoft Configuration Manager client
Monitor the Microsoft Configuration Manager client
Manage the Microsoft Configuration Manager client
Enroll devices using Microsoft Intune
Manage mobile devices with Intune
Enable mobile device management
Explain considerations for device enrollment
Manage corporate enrollment policy
Enroll Windows devices in Intune
Enroll Android devices in Intune
Enroll iOS devices in Intune
Explore device enrollment manager
Monitor device enrollment
Manage devices remotely
Knowledge check
Execute device profiles
Explore Intune device profiles
Create device profiles
Create a custom device profile
Knowledge check
Oversee device profiles
Monitor device profiles in Intune
Manage device sync in Intune
Manage devices in Intune using scripts
Maintain user profiles
Examine user profile
Explore user profile types
Examine options for minimizing user profile size
Deploy and configure folder redirection
Sync user state with Enterprise State Roaming
Configure Enterprise State Roaming in Azure
Execute mobile application management
Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune
Deploy and update applications
Deploy applications with Intune
Add apps to Intune
Manage Win32 apps with Intune
Deploy applications with Configuration Manager
Deploying applications with Group Policy
Assign and publish software
Explore Microsoft Store for Business
Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune
Assign apps to company employees
Administer endpoint applications
Manage apps with Intune
Manage Apps on non-enrolled devices
Deploy Microsoft 365 Apps with Intune
Additional Microsoft 365 Apps Deployment Tools
Configure Microsoft Edge Internet Explorer mode
App Inventory Review
Protect identities in Microsoft Entra ID
Explore Windows Hello for Business
Deploy Windows Hello
Manage Windows Hello for Business
Explore Microsoft Entra ID Protection
Manage self-service password reset in Microsoft Entra ID
Implement multi-factor authentication
Enable organizational access
Enable access to organization resources
Explore VPN types and configuration
Explore Always On VPN
Deploy Always On VPN
Implement device compliance
Protect access to resources using Intune
Explore device compliance policy
Deploy a device compliance policy
Explore conditional access
Create conditional access policies
Generate inventory and compliance reports
Report enrolled devices inventory in Intune
Monitor and report device compliance
Build custom Intune inventory reports
Access Intune using Microsoft Graph API
Deploy device data protection
Explore Windows Information Protection
Plan Windows Information Protection
Implement and use Windows Information Protection
Explore Encrypting File System in Windows client
Explore BitLocker
Manage Microsoft Defender for Endpoint
Explore Microsoft Defender for Endpoint
Examine key capabilities of Microsoft Defender for Endpoint
Explore Windows Defender Application Control and Device Guard
Explore Microsoft Defender Application Guard
Examine Windows Defender Exploit Guard
Explore Windows Defender System Guard
Manage Microsoft Defender in Windows client
Explore Windows Security Center
Explore Windows Defender Credential Guard
Manage Microsoft Defender Antivirus
Manage Windows Defender Firewall
Explore Windows Defender Firewall with Advanced Security
Manage Microsoft Defender for Cloud Apps
Explore Microsoft Defender for Cloud Apps
Planning Microsoft Defender for Cloud Apps
Implement Microsoft Defender for Cloud Apps
Assess deployment readiness
Examine deployment guidelines
Explore readiness tools
Assess application compatibility
Explore tools for application compatibility mitigation
Prepare network and directory for deployment
Plan a pilot
Deploy using the Microsoft Deployment Toolkit
Evaluate traditional deployment methods
Set up the Microsoft Deployment Toolkit for client deployment
Manage and deploy images using the Microsoft Deployment Toolkit
Deploy using Microsoft Configuration Manager
Explore client deployment using Configuration Manager
Examine deployment components of Configuration Manager
Manage client deployment using Configuration Manager
Plan in-place upgrades using Configuration Manager
Deploy Devices using Windows Autopilot
Use Autopilot for modern deployment
Examine requirements for Windows Autopilot
Prepare device IDs for Autopilot
Implement device registration and out-of-the-box customization
Examine Autopilot scenarios
Troubleshoot Windows Autopilot
Implement dynamic deployment methods
Examine subscription activation
Deploy using provisioning packages
Use Windows Configuration Designer
Use Microsoft Entra join with automatic MDM enrollment
Plan a transition to modern endpoint management
Explore using co-management to transition to modern endpoint management
Examine prerequisites for co-management
Evaluate modern management considerations
Evaluate upgrades and migrations in modern transitioning
Migrate data when modern transitioning
Migrate workloads when modern transitioning
Manage Windows 365
Explore Windows 365
Configure Windows 365
Administer Windows 365
Manage Azure Virtual Desktop
Examine Azure Virtual Desktop
Explore Azure Virtual Desktop
Configure Azure Virtual Desktop
Administer Azure Virtual Desktop
Wichtige Information
Dieses Training behandelt prüfungsrelevante Themen zum Microsoft Examen: MD-102 Endpoint Administrator
HINWEIS:
Um während des Trainings an den Übungen teilnehmen zu können, ist eine Multi-Faktor-Authentifizierung (MFA) erforderlich. Dafür benötigen Sie ein Mobiltelefon und eine Authentifizierungs-App. Wir empfehlen die kostenlose Microsoft Mobile Phone Authenticator App.
Download Microsoft Mobile Phone Authenticator App.
Set up your Microsoft 365 sign-in for multi-factor authentication.