This lesson explores Microsoft Defender for Endpoint and how to implement it. We’ll start off with a quick overview of the three deployment phases that you’ll need to complete in order to implement Defender for Endpoint. We’ll then run through each of the individual deployment phases in a bit more detail.
By the time you finish this lesson, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.
This lesson is intended for anyone who wishes to learn about the steps involved in implementing Microsoft Defender for Endpoint.
To get the most out of this lesson, you should have a fundamental understanding of basic endpoint protection concepts.