Implementing Microsoft Defender for Endpoint
Difficulty: Intermediate
Duration: 1 minute and 1 second
Students: 1,022
Rating: 4.5/5
This lesson explores Microsoft Defender for Endpoint and how to implement it. We’ll start off with a quick overview of the three deployment phases that you’ll need to complete in order to implement Defender for Endpoint. We’ll then run through each of the individual deployment phases in a bit more detail.
Learning Objectives
By the time you finish this lesson, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.
Intended Audience
This lesson is intended for anyone who wishes to learn about the steps involved in implementing Microsoft Defender for Endpoint.
Prerequisites
To get the most out of this lesson, you should have a fundamental understanding of basic endpoint protection concepts.