MS-100-101 - Microsoft 365 Certified: Enterprise Administrator Expert

Microsoft cours officiels

Ces cours sont dispensés en français sur la base d'une documentation pédagogique en anglais.
These 2 courses of respectively 5 and 4 days are designed for IT Professionals who will learn how to plan an Office 365 deployment, how to configure Office 365, and how to manage Office 365 ProPlus deployments.
These courses help prepare for the exams « MS-100 - Microsoft 365 Identity and Services » and « MS-101: Microsoft 365 Mobility and Security » to obtain the title « Microsoft 365 Certified: Enterprise Administrator Expert ».

Modules, dates, inscription

These 2 courses of each 5 days are given once a semester, 1 to 2 days a week, from 9:00 am to 12:00 pm and from 1:30 pm to 5:00 pm.
1. MS-100 - Microsoft 365 Identity and Services
Durée
5
Prix
CHF 3'750.-
Prix/j.
CHF 750.-
Cycle 1
17, 24 sep, 1, 8, 15 oct 2024
2. MS-101 - Microsoft 365 Mobility and Security
Durée
5
Prix
CHF 3'750.-
Prix/j.
CHF 750.-
Cycle 1
Sur demande
These courses are given in French on the basis of documentation in French if available (Fra) or in English (Eng). If it is available in both languages, the French version is distributed unless specifically requested by the interested party. The price of the course includes all the pedagogical documentation distributed.

1. Microsoft 365 Identity and Services (MS-100)

Overview :

This course is divided into 3 complementary parts :
  • 1. Office 365 Management

    This course introduces you to the key components of Office 365 and then focuses on what it takes to move your organization to Office 365. You will spend time learning how to plan an Office 365 deployment, how to configure Office 365, and how to manage Office 365 ProPlus deployments. The course begins with an introduction to the core components of Office 365. You will begin by examining Exchange Online, including how to create and manage recipients, as well as how to manage anti-malware, anti-spam, and your disaster recovery needs. This is followed by an introduction to retention policies and tags, including how to plan for migration strategies and how to select the right migration option for your organization. You will also learn how to migrate mailboxes to Office 365 in a hybrid deployment.

    The course then introduces you to SharePoint Online. You will learn how to create a SharePoint hybrid environment and how to manage your local site. This includes an introduction to the encryption services used by SharePoint Online, as well as data loss prevention and anti-malware protection. From SharePoint Online, you will transition to Microsoft Teams. You will examine how to use collaboration apps in Office 365, and you will be introduced to user authentication, guest access, audio conferencing, and implementing phone systems.

    Following this introduction to Office 365 components, the course takes a deep dive into what it takes to move an organization to Office 365. Since every successful deployment is a product of extensive planning, this course focuses on how to plan for network requirements, service setup, and a hybrid environment. This includes planning for a hybrid Exchange environment, a hybrid SharePoint environment, and a hybrid Skype for Business environment. The course then examines what it takes to migrate your organization to Office 365, including how to clean up Active Directory, how to plan for mail migration, as well as performance and network considerations when migrating mail.

    At this point, the course transitions from planning for Office 365 to configuring Office 365. This begins with an introduction to the Office 365 clients, including mobile clients and Office online. Once you have a firm understanding of the Office 365 clients, you will then learn how to configure client connectivity to Office 365. This includes employing automatic client configuration, as well as how to configure the DNS records that must be maintained to support automatic client configuration. You will then examine Outlook clients and how to configure multi-factor authentication, as well as how to troubleshoot client connectivity issues.

    The course then moves into the realm of Office 365 ProPlus deployments. You will learn how to manage client-driven installations, with a focus on Office 365 ProPlus licensing, activation, and update options. The course then examines how to manage centralized Office 365 ProPlus deployments, which involves configuring Office 365 ProPlus with the Office Deployment tool and deploying Office 365 ProPlus using Group Policy.

    From there you will move into Office Telemetry, where you will learn about the data that is collected by Office Telemetry and how to plan for Telemetry. The course then examines how to install and configure Office Telemetry, as well as how to perform custom reporting in the Telemetry dashboard. The course concludes with a discussion on Windows Analytics, including how to configure Analytics and how to enroll devices in Analytics. This provides the foundation for using Analytics to assess your organization’s readiness to deploy Office 365.
  • 2. Microsoft 365 Tenant & Service Management

    Microsoft 365 Tenant and Service Management focuses on learning how to plan, manage, and customize your organization’s Microsoft 365 tenant and services. The course begins with an analysis of how to design your Microsoft 365 tenant. You will learn how to plan for a Microsoft 365 on-premises infrastructure, including preparing your organization for Microsoft 365 Enterprise, how to estimate your network bandwidth requirements, and best practices for integrating to Microsoft 365. We’ll then cover how to plan your identity and authentication solution. This includes an examination of various authentication methods, including modern authentication, multi-factor authentication, pass-through authentication, and federated authentication. This discussion will end with a review of Active Directory federation services in Microsoft Azure, and how to restrict traffic in an AD FS deployment.

    You will then transition from planning your Microsoft 365 tenant to configuring it. This begins with the various subscription options and component services that must be considered. You then move into setting up your organizational profile, managing tenant subscriptions, services, and add-ins. And to assist in this effort, you will be introduced to Microsoft FastTrack, and how this service can assist organizations in configuring their tenant and services.

    With your Microsoft tenant and services in place, you will then learn how to manage these features following your initial deployment. Specifically, you will learn how to configure tenant roles and how to manage tenant health and services. This includes learning how to monitor your tenant health, how to develop an incident response plan, and how to request assistance from Microsoft.

    At the conclusion of the course, you will be tasked with completing a series of hands-on lab exercises that enable you to practice what you just learned in the course. You will set up a Microsoft 365 tenant, manage Microsoft 365 users, groups, and administration, configure Rights Management and compliance, and monitor and troubleshoot Microsoft 365.
  • 3. Microsoft 365 Identity Management

    The Microsoft 365 Identity Management focuses on how to manage user security groups and licenses for cloud identities, and how to plan and implement identity synchronization, federated identities, applications, and external access. The course begins by examining how to manage user security groups and licenses for cloud identities. You will examine how to create user accounts in Microsoft 365, and how to manage those accounts as well as user licenses. The course then provides instruction on how to manage admin roles, security groups, and passwords in Microsoft 365. You will be introduced to identity management in Azure Active Directory, multi-factor authentication, and self-service password management.

    The course then examines how to plan and implement identity synchronization. This begins with an introduction to identity synchronization, which includes an overview of Microsoft 365 authentication and provisioning options. You will then be introduced to directory synchronization and Azure AD Connect. From here you will learn how to effectively plan for and implement Azure AD Connect, including in both multi-forest scenarios and with pass-through authentication. Lastly, the course covers how to manage synchronized identities. This includes managing users and groups with directory synchronization, using Azure AD Connect synchronized security groups, and troubleshooting directory synchronization.

    The course then transitions to federated identities. This begins with an introduction of federation identities, which includes an overview of Active Directory Federated Services, or AD FS, as well as an examination of how AD FS differs from Azure AD Connect password synchronization. You’ll then look at single sign on options for Microsoft 365 and authentication flows with AD FS. The course then examines how to plan for and implement an AD FS deployment, which includes installing and configuring both AD FS and Web Application Proxy for AD FS. You’ll also learn how to configure AD FS by using Azure AD Connect, as well as how to troubleshoot AD FS. Finally, you’ll learn how to switch between federated authentication and password synchronization.

    Lastly, the course covers how to implement applications and external access in Azure Active Directory. This begins with instruction on how to add and update applications, how to configure multi-tenant applications, and how to remove applications. With your applications in place, you’ll then learn how to configure an Azure AD application proxy. This includes installing and registering a connector and publishing an on-premises app for remote access. The course concludes with a discussion on how to design solutions for external access, including licensing guidelines for an Azure AD business-to-business collaboration. You will learn how to manage external access, how to create a collaboration user, and how to troubleshoot an Azure AD business-to-business collaboration.
These courses help learners prepare for the Microsoft 365 Certified: Security Administrator Associate exam (MS-500).

Target Audience :

  • IT Professionals who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

Objectives :

After completing this course, students will be able to:
  • Office 365 overview
  • moving your organization to Office 365
  • configuring Office 365
  • managing Office 365 ProPlus deployments
  • plan their Microsoft 365 on-premises infrastructure
  • plan their identity and authentication solution
  • plan and configure their Microsoft 365 experience
  • leverage Microsoft’s FastTrack and partner services
  • implement their domain services
  • configure their Microsoft 365 tenant roles
  • manage their Microsoft 365 tenant health and services
  • manage user accounts and licenses in Microsoft 365
  • manage admin roles and security groups in Microsoft 365
  • plan and implement password management
  • manage Microsoft 365 authentication and provisioning options
  • plan for directory synchronization
  • plan and implement Azure AD Connect
  • manage synchronized identities
  • plan and implement an ADFS deployment
  • implement applications in Azure AD
  • configure Azure AD Application Proxy
  • design solutions for external access
  • manage their Microsoft 365 tenant health and services

Prerequisites :

This course is designed for IT Professionals who aspire to deploy and manage cloud services in their organization. Students should have the following background:
  • completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration
  • a proficient understanding of DNS and basic functional experience with Microsoft 365 services
  • a proficient understanding of general IT practices
  • knowledge of written English, with course materials and the certification exam being in English.

Program :

This course is composed of 13 modules including lessons and practical work (lab).
  1. Moving Your Organization to Office 365
  2. Configuring your Microsoft 365 Tenant
  3. Configuring Office 365
  4. Managing Office 365 ProPlus Deployments
  5. Hands-On Lab
  6. Designing your Microsoft 365 Tenant
  7. Configuring your Microsoft 365 Tenant
  8. Managing your Microsoft 365 Tenant
  9. Hands-On Lab
  10. Manage User Security Groups and Licenses for Cloud Identities
  11. Plan and Implement Identity Synchronization
  12. Planning and Implementing Federated Identities
  13. Implementing Applications and External Access
Module 1: Moving Your Organization to Office 365

Lessons
  • Exchange Online
  • SharePoint Online
  • Teams
  • Additional Resources


Module 2: Configuring your Microsoft 365 Tenant

Lessons
  • Planning Your Network with Office 365
  • Planning Your Service Setup
  • Planning Your Hybrid Environment
  • Planning Your Migration to Office 365


Module 3: Configuring Office 365

Lessons
  • Office 365 Client Overview
  • Configuring Office Client Connectivity to Office 365


Module 4: Managing Office 365 ProPlus Deployments

Lessons
  • Managing User-Driven Client Installations
  • Managing Centralized Office 365 ProPlus Deployments
  • Configuring Office Telemetry
  • Configuring Microsoft Analytics


Module 5: Hands-On Lab

Lab : Managing Office 365
  • Exercise 1: Set up a Microsoft 365 trial tenant
  • Exercise 2: Prepare an Office 365 ProPlus managed installation
  • Exercise 3: Manage user-driven Office 365 ProPlus installations
  • Exercise 4: Manage centralized Office 365 ProPlus installations
  • Exercise 5: Deploy and configure Office Telemetry components


Module 6: Designing your Microsoft 365 Tenant

Lessons
  • Planning a Microsoft 365 On-premises infrastructure
  • Planning Your Identity and Authentication Solution


Module 7: Configuring your Microsoft 365 Tenant

Lessons
  • Planning your Microsoft 365 Experience
  • Configuring your Microsoft 365 Experience
  • Leveraging FastTrack and Partner Services
  • Implementing Your Domain Services


Module 8: Managing your Microsoft 365 Tenant

Lessons
  • Configuring Tenant Roles
  • Managing Tenant Health and Services


Module 9: Hands-On Lab

Lab : Microsoft 365 Tenant and Service Management
  • Exercise 1: Set up a Microsoft 365 trial tenant
  • Exercise 2: Managing Microsoft 365 users, groups, and administration
  • Exercise 3: Configuring Rights Management and compliance
  • Exercise 4: Monitor and troubleshoot Microsoft 365


Module 10: Manage User Security Groups and Licenses for Cloud Identities

Lessons
  • User Accounts and Licenses in Microsoft 365
  • Admin Roles and Security Groups in Microsoft 365
  • Password Management in Microsoft 365
Lab : Managing your Microsoft 365 Identity environment
  • Exercise 1: Setting up your lab environment
  • Exercise 2: Managing your Microsoft 365 identity environment using the Microsoft 365 admin center
  • Exercise 3: Managing your Microsoft 365 identity environment using Windows PowerShell


Module 11: Plan and Implement Identity Synchronization

Lessons
  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities


Lab : Implementing Identity Synchronization
  • Exercise 1: Setting up your organization for identity synchronization
  • Exercise 2: Implement Identity Synchronization


Module 12: Planning and Implementing Federated Identities

Lessons
  • Introduction to Federated Identities
  • Planning an AD FS Deployment
  • Implementing AD FS


Module 13: Implementing Applications and External Access

Lessons
  • Implementing Applications in Azure AD
  • Configuring Azure AD Application Proxy
  • Designing Solutions for External Access


2. Microsoft 365 Mobility and Security (MS-101)

Overview :

This course is divided into 3 complementary parts :
  • 1. Microsoft 365 Security Management

    The Microsoft 365 Security Management course takes you on an extensive journey through the world of cloud security. The course begins by examining how to manage your security metrics. This begins by building a foundational understanding of the threat landscape that faces organizations today. The course introduces you to phishing, spoofing, spam and malware, account breaches, elevation of privileges, data exfiltration, data deletion, data spillage, and more. With this knowledge in place, you will then examine various security solutions that can address these threats, including Exchange Online Protection, Microsoft 365 Advanced Threat Protection, Microsoft 365 Threat Intelligence, and Advanced Security Management. The course then takes a deep dive into Azure AD Identity Protection, including how to enable it, how to configure it to detect vulnerabilities and risk events, and how to plan your investigation. This coverage of security metrics ends with an introduction to Microsoft Secure Score, which is a security analytics tool designed to help organizations understand what they have done to reduce the risk to their data, and show them what they can do to further reduce that risk.

    With this foundational knowledge in place concerning today’s threat landscape and the Microsoft 365 security solutions that are available to address those threats, the course then examines how to configure those solutions. This begins with an introduction to Exchange Online Protection (EOP), during which you will learn how EOP enables you to configure the anti-malware pipeline in Microsoft 365, as well as phishing and spoofing protection, zero-hour purge, and spoofing intelligence. The course then transitions to Advanced Threat Protection (ATP), where it examines how ATP expands on the protections provided by Exchange Online Protection by using its Safe Attachments and Safe Links features. The course then takes a deep dive into each of these features and examines how to create and manage safe attachment and safe links policies in the Security and Compliance Center, as well as through Windows PowerShell. The course then identifies a variety of reports that are available to monitor your security status, including the Threat Protection Status report, the ATP message disposition report, the Malware Detections report, and much, much more.

    The course concludes with an extensive examination of Microsoft 365 Threat Intelligence. Since Microsoft 365 hosts one of the largest networks in the world and manages content created on millions of devices, Microsoft has been able to build a vast repository of threat intelligence data, as well as the systems needed to spot patterns that correspond to attack behaviors and suspicious activity. Microsoft 365 Threat Intelligence is a collection of these insights, which can help organizations proactively find and eliminate threats. As such, the course examines how to plan for and implement Microsoft 365 Threat Intelligence. This includes using the Microsoft Intelligence Security Graph, the Security Dashboard, and Threat Explorer. You will then learn how to configure Advanced Threat Analytics (ATA) and how to manage ATA services. Finally, you will be instructed on how to implement your own cloud application security. This includes deploying cloud app security, controlling your cloud apps with policies, and troubleshooting your cloud app security status.
  • 2. Microsoft 365 Compliance Management

    This course introduces you to the world of Microsoft 365 compliance management. It begins with an introduction to the different solutions that are available in Microsoft 365 for data retention and data loss prevention. The course then takes a detailed look at the planning steps that are necessary to implement data retention policies and archiving rules. You will learn about the different approaches for single services with message retention management and a records center, as well as the new centralized approach of managing all Microsoft 365 data retention in the Security and Compliance Center.

    You will then examine the steps needed to implement security and compliance requirements, such as proper organizational role management and the correct technical solutions that meet your business requirements. The course then analyzes how to protect your sensitive business data from being shared in ways that break your compliance rules, including implementing ethical walls and setting up data loss prevention policies.

    Students are then introduced to the latest Microsoft 365 solutions for protecting your sensitive business data on client devices. You will learn how the Microsoft Information Protection solutions work to protect data and documents that leave your managed network perimeter and how to prevent users from accidental or intended sharing of business data with unsecure locations on their clients.

    The course concludes by delving deep into eDiscovery investigations to track compliance breaches and manage compliance incidents with the Microsoft 365 tools from the Security and Compliance Center. The course examines how to manage and consolidate admin and user auditing log data from the Microsoft 365 services to provide complete compliance insight into your Microsoft 365 data and processes.
  • 3. Microsoft 365 Device Management

    Microsoft 365 Device Management focuses on how to establish Microsoft Intune, enroll devices to Intune, monitor the devices, and control what users can do from the enrolled devices by using conditional access policies. If you are already managing devices by using a traditional device management tool such as Configuration Manager, you will be interested to know how you can seamlessly move to modern management, in which devices are managed by Intune, and how you can benefit from new device management capabilities, such as compliance, conditional access, and Windows Autopilot to deploy new devices from the cloud.

    The course begins by examining how to move from traditional management, where devices are managed by Configuration Manager, to modern management, where you can benefit from new capabilities such as device compliance and conditional access. This journey can begin by enabling co-management, which you can do in your current environment by adding Intune as an additional device management option. You can then move management of some Windows 10 devices to Intune, while all other devices remain managed by Configuration Manager. After you get confidence and experience with the benefits of modern management, you will probably want to move the management of your other devices to Intune as well.

    The course then examines how you can monitor Windows 10 devices by using Windows Analytics. You will better understand the differences between quality updates and feature updates, as well as the Windows as a Service (WaaS) model, and when you must upgrade Windows 10 to a newer version to be supported by Microsoft. Although traditional, image-based deployment is still supported with Windows 10, many organizations will start exploring dynamic deployment and modern deployment options, such as Windows Autopilot.

    The course concludes with an examination of how to implement Mobile Device Management (MDM). With Microsoft 365 you have two Mobile Device Management options: Intune and MDM for Office 365. You will learn how to perform an initial configuration of Intune so that it can manage Windows 10 and Android devices, as well as the additional preparation steps that are required for iOS devices. As Intune can manage only enrolled devices, you will learn how to enroll different device types. You will also learn also how to define a company baseline and use Intune to monitor device compliance against the baseline.
This course help learners prepare for the exam "MS-101: Microsoft 365 Mobility and Security" which, together with exam "MS-100: Microsoft 365 Identity and Services", leads to certification "Microsoft 365 Certified: Enterprise Administrator Expert".

Target Audience :

  • IT Professionals who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

Objectives :

After completing this course, students will be able to:
  • manage Security Metrics
  • implement security solutions in Microsoft 365
  • plan and configure Azure AD identity protection
  • implement Microsoft Secure Score
  • implement Exchange Online Protection
  • implement Advanced Threat Protection
  • manage Safe Attachments and Safe Links
  • implement Microsoft 365 Threat Intelligence
  • implement their domain services
  • use the Microsoft 365 Security Dashboard
  • configure Advanced Threat Analytics
  • implement cloud application security
  • understand Data Governance in Microsoft 365, including: Archiving, Retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 Message Encryption, Data Loss Prevention
  • implement In-Place Records Management in SharePoint
  • implement archiving and retention in Exchange
  • plan their security and compliance needs
  • plan and implement Azure AD Connect
  • build ethical walls in Exchange Online
  • create a custom DLP policy
  • create a DLP policy to protect documents
  • implement policy tips
  • manage retention in email
  • troubleshoot data governance
  • implement information protection
  • implement Advanced Implementation Protection
  • understand Windows Information Protections
  • search for content in the Security and Compliance Center
  • audit log investigations
  • manage advanced eDiscovery
  • plan for Co-management
  • prepare your Windows 10 devices for Co-management
  • transition from Configuration Manager to Intune
  • configure Microsoft Store for Business
  • plan for Mobile Application Management
  • plan your Windows 10 deployment strategy
  • plan your Windows 10 subscription activation strategy
  • resolve Windows 10 upgrade errors
  • implement Windows 10 Analytics
  • deploy Mobile Device Management
  • manage devices with Mobile Device Management
  • enroll devices to Mobile Device Management
  • manage device compliance.

Prerequisites :

This course is designed for IT Professionals who aspire to deploy and manage cloud services in their organization. Students should have the following background:
  • completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration
  • a proficient understanding of DNS and basic functional experience with Microsoft 365 services
  • a proficient understanding of general IT practices
  • knowledge of written English, with course materials and the certification exam being in English.

Program :

This course is composed of 12 modules including lessons and practical work (lab).
  • Planning an Operating System Deployment Strategy
  • Implementing Windows 10
  • Managing Updates for Windows 10
  • Course Conclusion
  • Device Enrollment
  • Configuring Profiles
  • Application Management
  • Course Conclusion
  • Managing Authentication in Azure AD
  • Managing Devices and Device Policies
  • Managing Security
  • Course Conclusion
Module 1: Planning an Operating System Deployment Strategy

This Module explains how to plan and implement a deployment strategy. It covers various methods and scenarios for deploying Windows. It discusses on-premise and cloud technologies as well as considerations for new deployments, upgrading, and migrations.

Lessons
  • Overview of Windows as a service
  • Windows 10 Deployment options
  • Considerations for Windows 10 deployment
Lab : Practice Lab – Planning Windows 10 deployment After completing this Module, students will be able to:
  • Describe Windows as a Service.
  • Describe the different methods for deployment.
  • Understand the differences between on-premise and cloud-based solutions.
  • Describe methods of dynamic provisioning.
  • Describe the different tools avaliable in the Windows Assessment and Deployment Kit.
  • Describe the scenarios and limitations for in-place upgrades and migrations.


Module 2: Implementing Windows 10

This Module covers new modern methods for deploying Windows 10 such as Windows Autopilot and provisioning packages. This Module also covers tool used in upgrade planning, application compatibility and migration methods.

Lessons
  • Implementing Windows 10 by using dynamic deployment
  • Implementing Windows 10 by using Windows Autopilot
  • Upgrading devices to Windows 10
Lab : Practice Lab – Implementing Windows 10
  • Creating and deploying provisioning package
  • Migrating user settings
  • Deploying Windows 10 with AutoPilot
After completing this course, learners should be able to:
  • Develop an Operating System deployment and upgrade strategy
  • Understand the different methods of deployment.
  • Understand which scenarios on-premise and cloud-based solutions can be used for.
  • Deploy and migrate desktops to Windows 10.
  • Plan and configure Windows Update policies.


Module 3: Managing Updates for Windows 10

This Module covers managing updates to Windows. This Module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies.

Lessons
  • Updating Windows 10
  • Windows Update for Business
  • Introduction to Windows Analytics
Lab : Practice Lab – Managing Updates for Windows 10
  • Manually configuring Windows Update settings
  • Configuring Windows Update by using GPOs
After completing this Module, students will be able to:
  • Describe the Windows 10 servicing channels.
  • Configure a Windows update policy using Group Policy settings.
  • Configure Windows Update for Business to deploy OS updates.
  • Use Windows Analytics to assess upgrade readiness and update compliance.


Module 4: Course Conclusion Lessons
  • Final Exam
Lab : Graded Lab After completing this Module, students will be able to:
  • Create a provisioning package.
  • Configure an Autopilot deployment.
  • Describe the tools used for planning upgrades and migrations.
  • Describe the methods used to migrate user data.


Module 5: Device Enrollment

In this Module , students will examine the benefits and prerequisites for co-management and learn how to plan for it. This Module will also cover Azure AD join and will be introduced to Microsoft Intune, as well as learn how to configure policies for enrolling devices. The Module will conclude with an overview of device inventory in Intune and reporting using the Intune console, Power BI and Microsoft Graph.

Lessons
  • Device management options
  • Manage Intune device enrollment and inventory
Lab : Practice Lab – Device Enrollment and Management
  • Installing the MDM Migration Analysis Tool (MMAT)
  • Obtain Intune and Azure AD Premium licenses and enable device management
  • Enrolling devices in Intune
  • Managing devices in Intune
  • Creating device inventory reports
After completing this Module, students will be able to:
  • Describe benefits and methods for migrating to co-management.
  • Deploy an MDM with Microsoft Intune.
  • Configure device enrollment.
  • Enroll desktop and mobile devices in Windows Intune.
  • Configure and downloads inventory reports.


Module 6: Configuring Profiles

This Module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. The Module will conclude with an overview of using Windows Analytics for health and compliance reporting.

Lessons
  • Configuring device profiles
  • Managing user profiles
  • Monitoring devices
  • Configuring roaming user profiles and Folder Redirection
  • Create and deploy device profile based on the scenario
  • Change deployed policy and monitor user and device activity
  • Configuring Enterprise State Roaming
After completing this Module, students will be able to:
  • Describe the types of device profiles.
  • Create and assign device profiles.
  • Configure user profile and folder redirection.
  • Monitor and report on devices using Intune and Windows Analytics.


Module 7: Application Management

In this Module , students learn about application management on-premise and cloud-based solutions. This Module will cover how to manage Office 365 ProPlus deployments in Intune as well as how to manage apps on non-enrolled devices. The Module will conclude with an overview of Enterprise Mode with Internet Explorer and Microsoft Edge and tracking your installed applications, licenses, and assigned apps using Intune.

Lessons
  • Implement Mobile Application Management (MAM)
  • Deploying and updating applications
  • Administering applications
Lab : Practice Lab – Managing Applications
  • Deploying apps by using Intune
  • Configure and deploy Office 365 ProPlus from Intune
  • Configure mobile application management (MAM) policies in Intune
After completing this Module, students will be able to:
  • Describe the methods for application management.
  • Deploy applications using Intune and Group Policy.
  • Configure Microsoft Store for Business.
  • Deploy Office365 ProPlus using Intune.
  • Manage and report application inventory and licenses.
  • Configure Internet Explorer Enterprise Mode.


Module 8: Course Conclusion Lessons
  • Final Exam
Lab : Graded Lab After completing this Module, students will be able to:
  • Describe the types of device profiles.
  • Create and assign device profiles.
  • Configure user profile and folder redirection.
  • Monitor and report on devices using Intune and Windows Analytics.


Module 9: Managing Authentication in Azure AD

In this Module , students well be introduced to the concept of directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication. The Module will conclude with securely accessing corporate resources and introduce concepts such as Always On VPN and remote connectivity in Windows 10.

Lessons
  • Azure AD Overview
  • Managing identities in Azure AD
  • Protecting identities in Azure AD
  • Managing device authentication
  • Enabling corporate access
Lab : Practice Lab – Managing objects and authentication in Azure AD
  • Enabling and configuring Azure AD Premium with Enterprise Mobility + Security (EMS) tenant
  • Creating user and group objects with UI and Windows PowerShell
  • Configuring Self-service password reset (SSPR) for user accounts in Azure AD
  • Joining a device to Azure AD
After completing this Module, students will be able to:
  • Describe the capabilities of Azure AD.
  • Manage users using Azure AD with Active Directory DS.
  • Implement Windows Hello for Business.
  • Join devices to Azure AD.
  • Describe methods of enabling access from external networks.


Module 10: Managing Devices and Device Policies

In this Module , students will be introduced to managing device security with Intune. Students will discover how Intune can use device profiles to manage configuration of devices to protect data on a device. Students will learn how to create and deploy compliance policies and use compliance policies for conditional access. The Module concludes with monitoring devices enrolled in Intune.

Lessons
  • Microsoft Intune Overview
  • Managing devices with Intune
  • Implement device compliance policies
Lab : Practice Lab – Managing devices
  • Configuring Microsoft Intune for device management
  • Configuring compliance policies and device profiles
  • Enrolling Windows 10 devices and managing compliance
After completing this Module, students will be able to:
  • Describe mobile device management with Intune.
  • Create and assign device profiles to protect data on devices.
  • Deploy compliance and conditional access policies.
  • Use Intune to monitor device compliance.


Module 11: Managing Security

In this Module , students will learn about data protection. Topics will include Windows & Azure Information Protection, and various encryption technologies supported in Windows 10. This Module also covers key capabilities of Windows Defender Advanced Threat Protection and how to implement these capabilities on devices in your organization. The Module concludes using Windows Defender and using functionalities such as antivirus, firewall and Credential Guard.

Lessons
  • Implement device data protection
  • Managing Windows Defender ATP
  • Managing Windows Defender in Windows 10
Lab : Practice Lab – Managing Security in Windows 10
  • Configuring Encrypting File System (EFS)
  • Configuring BitLocker
  • Configuring a WIP policy in Intune
  • Configuring Windows Defender
After completing this Module, students will be able to:
  • Describe the methods protecting device data.
  • Describe the capabilities and benefits of Windows ATP
  • Deploy and manage settings for Windows Defender clients.




Module 12 Course Conclusion Lessons
  • Final Exam
Lab : Graded Lab
Scroll to Top
Nous utilisons les cookies afin de fournir les services et fonctionnalités proposés sur notre site et afin d’améliorer l’expérience de nos utilisateurs. Les cookies sont des données qui sont téléchargés ou stockés sur votre ordinateur ou sur tout autre appareil
En cliquant sur ”J’accepte”, vous acceptez l’utilisation des cookies. Vous pourrez toujours les désactiver ultérieurement. Si vous supprimez ou désactivez nos cookies, vous pourriez rencontrer des interruptions ou des problèmes d’accès au site.