Administering Microsoft Endpoint Configuration Manager 55348AC Course Overview

Administering Microsoft Endpoint Configuration Manager 55348AC Course Overview

The Administering Microsoft Endpoint Configuration Manager (MECM) 55348AC course is designed to equip IT professionals with the skills needed to efficiently manage devices and applications across an enterprise environment. Through a comprehensive set of modules, learners will explore the architecture, administrative tools, and various functionalities of Configuration Manager. Hands-on labs provide practical experience in tasks such as Deploying and monitoring clients, Managing software updates, Implementing Endpoint Protection, and Overseeing compliance settings.

By the end of the course, participants will have a solid understanding of how to use Configuration Manager to maintain control over IT infrastructure, ensuring that systems are up-to-date, secure, and performing optimally. Key takeaways include Managing software inventory, Application deployment, and Securing data access. The course also covers the latest features introduced in Microsoft Endpoint Configuration Manager, keeping professionals current with the evolving landscape. This MECM course is essential for those looking to strengthen their skills in managing a modern workplace's devices and services.

CoursePage_session_icon

Successfully delivered 15 sessions for over 19 professionals

Purchase This Course

2,500

  • Live Training (Duration : 40 Hours)
  • Per Participant
  • Guaranteed-to-Run (GTR)
  • date-img
  • date-img

♱ Excluding VAT/GST

Classroom Training price is on request

You can request classroom training in any city on any date by Requesting More Information

  • Live Training (Duration : 40 Hours)
  • Per Participant

♱ Excluding VAT/GST

Classroom Training price is on request

You can request classroom training in any city on any date by Requesting More Information

Request More Information

Email:  WhatsApp:

Koenig's Unique Offerings

Course Prerequisites

To ensure that participants are well-prepared and can gain the most from the Administering Microsoft Endpoint Configuration Manager 55348AC course, the following are the minimum required prerequisites:


  • Basic understanding of networking fundamentals, including TCP/IP and Domain Name System (DNS).
  • Familiarity with Active Directory Domain Services (AD DS) principles and management.
  • Basic knowledge of Windows Server administration, including Windows Server roles and services.
  • Experience with Windows client operating systems such as Windows 10 or Windows 11.
  • Fundamental understanding of Microsoft SQL Server, including database concepts and basic queries.
  • An awareness of basic public key infrastructure (PKI) concepts.
  • Experience with Windows PowerShell or other scripting languages is beneficial but not essential.

These prerequisites are intended to provide a solid foundation on which the course content will build. They are not meant to be exhaustive but should ensure a baseline level of knowledge that will enable you to engage with the course material effectively.


Target Audience for Administering Microsoft Endpoint Configuration Manager 55348AC

The Administering Microsoft Endpoint Configuration Manager 55348AC course is designed for IT professionals responsible for managing endpoints in a networked environment.


  • Systems Administrators
  • Configuration Manager Administrators
  • Network Managers
  • IT Managers with a focus on infrastructure management
  • Desktop Support Technicians
  • Enterprise Desktop Administrators
  • IT Professionals seeking to learn about Configuration Manager and Microsoft Endpoint Manager
  • Security Administrators responsible for managing endpoint protection and compliance
  • Infrastructure Architects who plan and design endpoint management solutions
  • Help Desk Technicians aiming to expand their skillset into systems management and troubleshooting
  • Professionals preparing for Microsoft certification exams related to Microsoft Endpoint Configuration Manager


Learning Objectives - What you will Learn in this Administering Microsoft Endpoint Configuration Manager 55348AC?

Introduction to Learning Outcomes

Gain expertise in Microsoft Endpoint Configuration Manager for enterprise device management, encompassing deployment, application management, security, and compliance.

Learning Objectives and Outcomes

  • Understand the principles of systems management and the architecture of Configuration Manager for effective IT infrastructure oversight.
  • Utilize Configuration Manager administrative tools for monitoring and troubleshooting, enhancing operational efficiency.
  • Develop skills to analyze device data in real-time using queries, reports, and CMPivot, enabling informed decision-making.
  • Prepare the Configuration Manager infrastructure, including boundary configurations and resource discovery, to optimize network management.
  • Master the deployment and management of Configuration Manager clients, ensuring comprehensive device management across the enterprise.
  • Learn to configure, manage, and deploy applications and manage content distribution, streamlining software delivery and updates.
  • Implement and maintain software updates, including third-party updates, to keep managed PCs secure and up-to-date.
  • Deploy Defender Protection policies and manage advanced threat protection to enhance endpoint security.
  • Manage compliance settings and secure data access, safeguarding company resources and ensuring regulatory adherence.
  • Explore the latest features in Microsoft Endpoint Configuration Manager and understand how to maintain and update the Configuration Manager infrastructure.

Technical Topic Explanation

Deploying and monitoring clients

Deploying and monitoring clients involves setting up software or systems on client devices and then continuously tracking their performance and health. During deployment, configurations are tailored to meet specific needs, ensuring the clients are ready for use. Monitoring helps in observing system operations, identifying potential issues early, and optimizing performance. It's vital for maintaining system reliability and user satisfaction by proactively managing updates, troubleshooting errors, and improving functionalities. This ultimately aids in enhancing the overall system efficiency and ensures smooth operations across different client platforms.

Managing software updates

Managing software updates involves regularly checking and applying software changes to enhance performance, fix bugs, and protect against security vulnerabilities. This process keeps applications and systems running smoothly and safely. It often includes scheduling updates during low-use hours, testing updates in a non-production environment, and backing up existing software to prevent data loss in case updates cause issues. Effective software update management can prevent costly downtimes and breaches, ensuring that your technological resources remain efficient, secure, and up-to-date. Regular training, like a MECM course, can help professionals in managing these updates more effectively.

Implementing Endpoint Protection

Implementing endpoint protection involves securing various devices like computers, mobile phones, and tablets connected to your corporate network. This protection aims to prevent, detect, and respond to cyber threats such as malware and ransomware that target these endpoints. Effective strategies include installing antivirus software, ensuring regular updates and patches, and monitoring devices continuously for suspicious activities. This approach helps maintain the integrity and confidentiality of your network by protecting it from potential breaches that originate from these devices.

Overseeing compliance settings

Overseeing compliance settings involves monitoring and managing an organization's adherence to regulatory guidelines and internal policies. It ensures all technological processes, from data protection to software management, operate within legal frameworks and company standards. Effective oversight minimizes risks, promotes security, and enhances trust among stakeholders. This practice is critical in maintaining operational integrity and avoiding penalties or legal issues due to non-compliance. Tools and strategies can be employed to streamline this oversight, ensuring regular updates and audits are handled efficiently.

Managing software inventory

Managing software inventory involves tracking and managing all software assets within an organization. This includes cataloging software applications, licenses, versions, and usage data. Effective management ensures compliance with licensing agreements, aids in budget planning, and supports cybersecurity by identifying unauthorized or outdated software. It helps in optimizing resources and making informed decisions about software procurement and deployment. The process can be streamlined with tools like Microsoft Endpoint Configuration Manager (MECM), which automates and enhances inventory management, helping organizations maintain an efficient and secure software environment.

Application deployment

Application deployment refers to the process of making a software application available for use. This involves transferring the application from development into a live, operational environment where it can be accessed by users. The deployment process often includes steps such as setting up the necessary hardware and software environments, loading the application onto servers, configuring settings for optimal performance, and testing to ensure everything works as intended. This makes the application ready for real-world use by end users, ensuring it performs well and is free from major issues.

Securing data access

Securing data access involves implementing measures to ensure that sensitive or critical information is only accessible to authorized users. This entails using a combination of technological solutions and stringent policies to control who can see and use data. Key techniques include encryption, which scrambles data so it can’t be read without a key, and authentication protocols, ensuring that only those with permission can access information. Regularly updating security practices is crucial to protect against emerging threats, providing a robust defense against unauthorized data access and potential breaches.

Target Audience for Administering Microsoft Endpoint Configuration Manager 55348AC

The Administering Microsoft Endpoint Configuration Manager 55348AC course is designed for IT professionals responsible for managing endpoints in a networked environment.


  • Systems Administrators
  • Configuration Manager Administrators
  • Network Managers
  • IT Managers with a focus on infrastructure management
  • Desktop Support Technicians
  • Enterprise Desktop Administrators
  • IT Professionals seeking to learn about Configuration Manager and Microsoft Endpoint Manager
  • Security Administrators responsible for managing endpoint protection and compliance
  • Infrastructure Architects who plan and design endpoint management solutions
  • Help Desk Technicians aiming to expand their skillset into systems management and troubleshooting
  • Professionals preparing for Microsoft certification exams related to Microsoft Endpoint Configuration Manager


Learning Objectives - What you will Learn in this Administering Microsoft Endpoint Configuration Manager 55348AC?

Introduction to Learning Outcomes

Gain expertise in Microsoft Endpoint Configuration Manager for enterprise device management, encompassing deployment, application management, security, and compliance.

Learning Objectives and Outcomes

  • Understand the principles of systems management and the architecture of Configuration Manager for effective IT infrastructure oversight.
  • Utilize Configuration Manager administrative tools for monitoring and troubleshooting, enhancing operational efficiency.
  • Develop skills to analyze device data in real-time using queries, reports, and CMPivot, enabling informed decision-making.
  • Prepare the Configuration Manager infrastructure, including boundary configurations and resource discovery, to optimize network management.
  • Master the deployment and management of Configuration Manager clients, ensuring comprehensive device management across the enterprise.
  • Learn to configure, manage, and deploy applications and manage content distribution, streamlining software delivery and updates.
  • Implement and maintain software updates, including third-party updates, to keep managed PCs secure and up-to-date.
  • Deploy Defender Protection policies and manage advanced threat protection to enhance endpoint security.
  • Manage compliance settings and secure data access, safeguarding company resources and ensuring regulatory adherence.
  • Explore the latest features in Microsoft Endpoint Configuration Manager and understand how to maintain and update the Configuration Manager infrastructure.