Tijekom treninga usvojiti ćete vještine i znanja potrebne za planiranje i postavljanje Endpointa koristeći suvremene tehnike postavljanja i implementirajući strategije ažuriranja.
Kroz trening će se predstaviti ključni elementi modernog upravljanja, pristupi zajedničkog centraliziranog upravljanja i Microsoft Intune integracija. Trening obuhvaća razvoj aplikacija, upravljanje aplikacijama temeljenim na pregledniku (engl. web-based) te ključne sigurnosne koncepte kao što su provjera autentičnosti, identitet, pristup i politika usklađenosti. Tehnologije kao što su Azure Active Directory, Azure Information Protection i Microsoft Defender for Endpoint prikazane su na razini zaštite uređaja i podataka.
Što ćete naučiti
Kome je namijenjeno
Endpoint administratorima odgovornim za implementaciju, konfiguraciju, osiguranje, upravljanje te nadzor uređaja i klijentskih aplikacija u poslovnom okruženju. Njihove dužnosti uključuju upravljanje identitetom, pristupom, politikama, ažuriranjima i aplikacijama, oni bi trebali biti dobro upućeni u radna opterećenja M365 i posjedovati opsežne vještine i iskustvo u postavljanju, konfiguriranju i održavanju sustava poput Windows 11 i novijih, kao i nonWindows uređaja. Njihova uloga naglašava usluge u oblaku u odnosu na tehnologije lokalnog (engl. on-premises) upravljanja. Endpoint administratorima koji zajedno s M365 Enterprise administratorom rade na razvoju i provedbi IT strategija usklađenima sa zahtjevima moderne organizacije.
Preduvjeti
- Poznavanje Microsoft 365 radnih opterećenja (engl. workloads) i iskustvo u postavljanju, konfiguriranju i održavanju sustava poput Windows 11 i novijih te nonWindows uređaja.
Nastavni plan
-
Pregledaj
- Module 1: Explore the Enterprise Desktop
This module covers modern endpoint management and enterprise desktop lifecycle concepts. It teaches the stages of the lifecycle (planning, deployment, maintenance) and provides a foundation for future learning.
After completing this module, students will be able to:
- Describe the benefits of Modern Management
- Explain the enterprise desktop life-cycle model
- Describe considerations for planning hardware strategies
- Describe considerations for post-deployment and retirement
- Explain the differences between the different editions of Windows
- Select the most suitable Windows device for your needs
- Describe the minimum recommended hardware requirements for installing Windows 11
- Describe Azure AD
- Compare Azure AD to Active Directory Domain Services (AD DS)
- Describe how Azure AD is used as a directory for cloud apps
- Describe Azure AD Premium P1 and P2
- Describe Azure AD Domain Services
- Describe RBAC and user roles in Azure AD
- Create and manage users in Azure AD
- Create and manage groups in Azure AD
- Use Windows PowerShell cmdlets to manage Azure AD
- Describe how you can synchronize objects from AD DS to Azure AD
- Describe Azure AD join
- Describe Azure AD join prerequisites, limitations and benefits
- Join device to Azure AD
- Manage devices joined to Azure AD
- Describe Microsoft Endpoint Manager
- Understand the advantages of managing a client with Configuration Manager
- Deploy the Configuration Manager client
- Monitor the Configuration Manager client
- Manage Configuration Manager devices
- Prepare Microsoft Intune for device enrollment
- Configure Microsoft Intune for automatic enrollment
- Explain how to enroll Windows, Android and iOS devices in Intune
- Explain when and how to use Intune Enrollment Manager
- Understand how to monitor and perform remote actions on enrolled devices
- Describe the various types of device profiles in Intune
- Explain the difference between built-in and custom profiles
- Create and manage profiles
- Monitor the assignments of profiles
- Understand how profiles are synchronized and how to manually force synchronization
- Use PowerShell to execute and monitor scripts on devices
- Explain the various user profile types that exist in Windows
- Describe how a user profile works
- Configure user profiles to conserve space
- Explain how to deploy and configure Folder Redirection
- Explain Enterprise State Roaming
- Configure Enterprise State Roaming for Azure AD devices
- Explain Mobile Application Management
- Understand application considerations in MAM
- Explain how to use Configuration Manager for MAM
- Use Intune for MAM
- Implement and manage MAM policies
- Explain how to deploy applications using Intune and Configuration Manager
- Learn how to deploy applications using Group Policy
- Understand Microsoft Store Apps
- Learn how to deploy apps using Microsoft Store Apps
- Learn how to configure Microsoft Store Apps
- Explain how to manage apps in Intune
- Understand how to manage apps on non-enrolled devices
- Understand how to deploy Microsoft 365 Apps using Intune
- Learn how to configure and manage IE mode in Microsoft Edge
- Learn about app inventory options in Intune
- Describe Windows Hello for Business
- Describe Windows Hello deployment and management
- Describe Azure AD Identity Protection
- Describe and manage self-service password reset in Azure AD
- Describe and manage multi-factor authentication
- Describe how you can access corporate resources
- Describe VPN types and configuration
- Describe Always On VPN
- Describe how to configure Always On VPN
- Describe device compliance policy
- Deploy a device compliance policy
- Describe conditional access
- Create conditional access policies
- Generate inventory reports and Compliance reports using Microsoft Intune
- Report and monitor device compliance
- Create custom reports using the Intune Data Warehouse
- Use the Microsoft Graph API for building custom reports
- Describe Windows Information Protection
- Plan for Windows Information Protection usage
- Implement and use Windows Information Protection
- Describe the Encrypting File System (EFS)
- Describe BitLocker
- Describe Microsoft Defender for Endpoint
- Describe key capabilities of Microsoft Defender for Endpoint
- Describe Microsoft Defender Application Guard
- Describe Microsoft Defender Exploit Guard
- Describe Windows Defender System Guard
- Describe Windows Security capabilities
- Describe Windows Defender Credential Guard
- Manage Microsoft Defender Antivirus
- Manage Windows Defender Firewall
- Manage Windows Defender Firewall with Advanced Security
- Describe Microsoft Defender for Cloud Apps
- Plan for Microsoft Defender for Cloud Apps usage
- Implement and use Microsoft Defender for Cloud Apps
- Describe the guidelines for an effective enterprise desktop deployment
- Explain how to assess the current environment
- Describe the tools that you can use to assess your current environment
- Describe the methods of identifying and mitigating application compatibility issues
- Explain considerations for planning a phased rollout
- Describe the fundamentals of using images in traditional deployment methods
- Describe the key benefits, limitations, and decisions when planning a deployment of - Windows using Microsoft Deployment Toolkit (MDT)
- Describe how Configuration Manager builds upon MDT and how both can work in harmony
- Explain the different options and considerations when choosing the user interaction experience during deployment, and which methods and tools support these experiences
- Describe the capabilities of Configuration Manager
- Describe the key components of Configuration Manager
- Describe how to troubleshoot Configuration Manager deployments
- Explain the benefits of modern deployment for new devices
- Describe the process of preparing for an Autopilot deployment
- Describe the process of registering devices in Autopilot
- Describe the different methods and scenarios of Autopilot deployments
- Describe how to troubleshoot common Autopilot issues
- Describe the process of deployment using traditional methods
- Describe how Subscription Activation works
- Describe the benefits of Provisioning Packages
- Explain how Windows Configuration Designer creates Provisioning Packages
- Describe the benefits of using MDM enrollment with Azure AD join
- Identify usage scenarios for Azure AD join
- Identify workloads that you can transition to Intune
- Identify prerequisites for co-management
- Identify considerations for transitioning to modern management
- Plan a transition to modern management using existing technologies
- Plan a transition to modern management using Microsoft Intune
- Describe the key features of Windows 365
- Describe the Windows 365 management experience
- Describe the Windows 365 security model
- Describe the Windows 365 deployment options
- Describe the Windows 365 licensing model
- Describe the key features of Azure Virtual Desktop
- Describe the Azure Virtual Desktop management experience
- Describe the Azure Virtual Desktop security model
- Describe the Azure Virtual Desktop deployment options
Za što vas priprema?
- Certifikacijski ispit: Exam MD-102: Endpoint Administrator
- Certifikat: Microsoft 365 Certified: Endpoint Administrator Associate