Arrow Electronics, Inc.

MD-101: Managing Modern Desktops

CÓDIGO: MCS_MD101

DURACIÓN: 40 Hours (5 días)

Precio: A consultar

Descripción

A: Deploying the Modern Desktop
As desktops has evolved, so have methods for deploying and updating them. In this course, you'll learn how to plan and implement an operating system deployment strategy. This course will help you understand the various methods available, the scenarios they're suited for, as well as how to deploy Windows using modern methods. This course will also cover planning and implementing an update strategy for Windows.

B: Managing Modern Desktops and Devices
As demand for organizations to enable workforces to be more mobile, a desktop administrator’s role is really is no longer about just “desktop” management. With BYOD becoming commonplace and the need for employees to access line of business apps on personal devices, the scope of desktop administration must include both desktop and mobile devices, regardless of ownership. During this course, you’ll be introduced to key components of modern management and co-management strategies. You’ll examine what it takes to incorporate Microsoft Intune into your organization and how to use it to manage modern desktops and devices. You’ll also learn about methods for deployment and management of apps and browser-based applications.

C: Protecting Modern Desktops and Devices
Every day, more organizations are asking IT to support mobility in the workforce. Modern environments require the Desktop Administrator be able to manage and support phones, tablets, and computers, whether it be owned by the organization or personally owned by the employee. At the same time, IT must still be able to protect the data that these devices access. In this course, the student will be introduced to the key concepts of security in modern management. This course covers authentication, identities, and access, as well as about how to protect these categories. The student will be introduced to Azure Active Directory and learn how to use Microsoft Intune to protect devices and data with compliance policies. Finally, this course will cover key capabilities of Azure Information Protection and Windows Defender Advanced Threat Protection and how to implement these capabilities

Programa

  • Deploy and Update Operating Systems
  • Plan and implement Windows 10 by using dynamic deployment
  • Evaluate and select an appropriate deployment options; pilot deployment; manage and troubleshoot provisioning packages
  • Plan and implement Windows 10 by using Windows Autopilot
  • Evaluate and select an appropriate deployment options; pilot deployment; create, validate, and assign deployment profile; extract device HW information to CSV file; import device HW information to cloud service; troubleshoot deployment
  • Upgrade devices to Windows 10
  • Identify upgrade and downgrade paths; manage in-place upgrades; configure a Windows analytics environment; perform Upgrade Readiness assessment; migrate user profiles
  • Manage updates
  • Configure Windows 10 delivery optimization; configure Windows Update for Business; deploy Windows updates; implement feature updates; monitor Windows 10 updates
  • Manage device authentication
  • Manage authentication policies; manage sign-on options; perform Azure AD join
  • Manage Policies and Profiles
  • Plan and implement co-management
  • Implement co-management precedence; migrate group policy to MDM policies; recommend a co-management strategy
  • Implement conditional access and compliance policies for devices
  • Implement conditional access policies; manage conditional access policies; plan conditional access policies; implement device compliance policies; manage device compliance policies; plan device compliance policies
  • Configure device profiles
  • Implement device profiles; manage device profiles; plan device profiles
  • Manage user profiles
  • Configure user profiles; configure Enterprise State Roaming in Azure AD; configure sync settings; implement Folder Redirection (including OneDrive)
  • Manage and Protect Devices
  • Manage Windows Defender
  • Implement and manage Windows Defender Application Guard; implement and manage Windows Defender Credential Guard; implement and manage Windows Defender Exploit Guard; implement Windows Defender Advanced Threat Protection; integrate Windows Defender Application Control; manage Windows Defender Antivirus
  • Manage Intune device enrollment and inventory
  • Configure enrollment settings; configure Intune automatic enrollment; enable device enrollment; enroll non-Windows devices; enroll Windows devices; generate custom device inventory reports; review device inventory
  • Monitor devices
  • Monitor device health (e.g., log analytics, Windows Analytics, or other cloud-based tools); monitor device security
  • Manage Apps and Data
  • Deploy and update applications
  • Assign apps to groups; Deploy apps by using Intune; deploy apps by using Microsoft Store for Business; deploy O365 ProPlus; enable sideloading of apps into images; gather Office readiness data; configure IE Enterprise mode; configure and implement assigned access or public devices
  • Implement Mobile Application Management (MAM)
  • Implement MAM policies; manage MAM policies; plan MAM; configure Windows Information Protection; implement Azure Information Protection templates; securing data by using Intune

Fechas Programadas

También ofrecemos sesiones en otros países