Microsoft Defender Endpoint Training: Protect Your Windows Environment

Download Course Contents

Microsoft Defender Endpoint Course Overview

Microsoft Defender Endpoint is a security solution for Windows-based devices that provides real-time protection against viruses, malware, and other malicious software. It is designed to work seamlessly with the Microsoft Defender Advanced Threat Protection (ATP) platform, offering a comprehensive and integrated approach to endpoint security.
 
Some key features of Microsoft Defender Endpoint include:
 
  • Real-time protection: Microsoft Defender Endpoint provides real-time protection against threats, including viruses, malware, and other malicious software.
  • Integration with Microsoft Defender ATP: Microsoft Defender Endpoint is integrated with Microsoft Defender ATP, providing a single platform for identifying, detecting, and responding to advanced threats.
  • Cloud-powered: Microsoft Defender Endpoint leverages the power of the cloud to provide real-time protection against threats, even for endpoints that are not connected to the network.
  • Easy deployment: Microsoft Defender Endpoint can be easily deployed, configured, and managed from the Microsoft Endpoint Manager admin center.
  • Behavioral analysis: Microsoft Defender Endpoint uses behavioral analysis to detect and stop potential threats before they can cause harm.
 
Overall, Microsoft Defender Endpoint provides organizations with a comprehensive solution for protecting Windows-based devices against threats, and helps organizations stay secure in today's rapidly evolving threat landscape.
 
Target Audience:
 
  • IT administrators: IT administrators who are responsible for securing the endpoint devices within their organization can benefit from using Microsoft Defender Endpoint.
  • Small and medium-sized businesses: Small and medium-sized businesses that are looking for a comprehensive and cost-effective solution for protecting their endpoints can benefit from using Microsoft Defender Endpoint.
  • Enterprise organizations: Enterprise organizations that need to secure a large number of endpoint devices can benefit from using Microsoft Defender Endpoint, as it provides a comprehensive and scalable solution for protecting their endpoints.
  • Managed Service Providers (MSPs): Managed Service Providers (MSPs) can benefit from using Microsoft Defender Endpoint as it provides an integrated solution for protecting endpoints, which can be easily managed and configured.

Learning Objectives:

The learning objectives for Microsoft Defender Endpoint include:
 
  • Understanding the features and capabilities of Microsoft Defender Endpoint: Participants will learn about the key features and capabilities of Microsoft Defender Endpoint, including real-time protection, cloud-powered threat protection, behavioral analysis, and integration with Microsoft Defender ATP.
  • Deploying and configuring Microsoft Defender Endpoint: Participants will learn how to deploy and configure Microsoft Defender Endpoint, including setting up security policies, deploying agents, and managing endpoints.
  • Responding to security incidents: Participants will learn how to respond to security incidents, including how to investigate and respond to threats, and how to remediate compromised devices.
  • Managing endpoints with Microsoft Defender Endpoint: Participants will learn how to manage endpoints with Microsoft Defender Endpoint, including how to monitor the health and status of endpoints, and how to manage security policies and updates.
  • Integrating with other security solutions: Participants will learn how to integrate Microsoft Defender Endpoint with other security solutions, including how to integrate with Microsoft Defender ATP, and how to use Microsoft Defender Endpoint to protect endpoints in a hybrid environment.
 
home-icon

The 1-on-1 Advantage

Get 1-on-1 session with our expert trainers at a date & time of your convenience.
home-icon

Flexible Dates

Start your session at a date of your choice-weekend & evening slots included, and reschedule if necessary.
home-icon

4-Hour Sessions

Training never been so convenient- attend training sessions 4-hour long for easy learning.
home-icon

Destination Training

Attend trainings at some of the most loved cities such as Dubai, London, Delhi(India), Goa, Singapore, New York and Sydney.

You will learn:

Module 1: Windows Defender ATP
  • The Role of Windows Defender ATP
  • Windows Defender ATP Architecture
  • How Windows Defender ATP helps detect sophisticated threats?
  • What Else Can Windows Defender ATP Do for Us?
  • Requirements and initial steps
  • Manage Windows Defender ATP capabilities
  • Troubleshoot Windows Defender ATP
  • Next-generation capabilities
  • Dashboard Overview and what it means for my organization
  • Configuration score
  • Scenarios
  • Reduce your Threat and Vulnerability Exposure Tamp
  • Improve your Security Configuration
  • Hardware-based isolation
  • Application isolation
  • System requirements
  • System integrity
  • Application control
  • Exploit protection
  • Network protection
  • Controlled folder access
  • Credential Guard
  • Attack surface reduction
  • Network firewall
  • Security operations dashboard
  • Manage incidents
  • Manage alerts
  • Manage machine group and tags
  • Take response actions on a machine
  • Run antivirus scan
  • Restrict app execution
  • Check activity details in Action center
  • Stop and quarantine files in your network
  • Overview of Automated investigations
  • Understand the Automated investigation flow
  • Details of an Automated investigation
  • How an Automated investigation expands its scope
  • How threats are remediated
  • Overview of advanced hunting
  • Query data using Advanced hunting
  • Advanced hunting reference
  • Advanced hunting query language best practices
  • Custom detections
  • Create custom detections rules
  • Device management and Tamper Protection
  • Microsoft Intune Overview
  • Manage Intune device enrollment and inventory
  • Managing devices with Intune
  • Configuring and controlling device by using profiles
  • Managing user profiles
  • Monitoring devices
  • Azure AD Overview
  • Managing identities in Azure AD
  • Protecting identities in Azure AD
  • Managing device authentication
  • Microsoft Intune Overview
  • Implement device compliance policies
  • Understanding SCCM Roles
  • Understanding SCCM Agents
  • Defender ATP and Intune based Policy Integration
Live Online Training (Duration : 32 Hours)
We Offer :
  • 1-on-1 Public - Select your own start date. Other students can be merged.
  • 1-on-1 Private - Select your own start date. You will be the only student in the class.

1650 + If you accept merging of other students. Per Participant & excluding VAT/GST
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Group Training
1400 Per Participant & excluding VAT/GST
Online
05 - 08 Jun
09:00 AM - 05:00 PM CST
(8 Hours/Day)
Online
03 - 06 Jul
09:00 AM - 05:00 PM CST
(8 Hours/Day)
Winner of the Microsoft’s Asia Superstar Campaign in FY 22
Winner of the Microsoft’s Asia Superstar Campaign in FY 22
Course Prerequisites
  • Basic knowledge of Windows operating system: Participants should have a basic understanding of Windows operating systems and be familiar with the Windows operating system architecture.
  • Familiarity with security concepts: Participants should have a basic understanding of security concepts, such as threat protection, threat response, and incident management.
  • Basic knowledge of networking: Participants should have a basic understanding of networking, including IP addresses, subnets, and network protocols.
  • Basic knowledge of active directory: Participants should have a basic understanding of active directory and how it is used to manage users, computers, and other resources in a Windows environment.
  • Experience with security management tools: Participants should have some experience with security management tools, such as antivirus software and firewalls.

FAQ's


Yes, fee excludes local taxes.
Yes, we do.
The Fee includes:
  • Remote Labs
Yes, Koenig Solutions is a Microsoft Gold Learning Partner
Schedule for Group Training is decided by Koenig. Schedule for 1-on-1 is decided by you.
In 1 on 1 Public you can select your own schedule, other students can be merged. Choose 1-on-1 if published schedule doesn't meet your requirement. If you want a private session, opt for 1-on-1 Private.
Duration of Ultra-Fast Track is 50% of the duration of the Standard Track. Yes(course content is same).
1-on-1 Public - Select your start date. Other students can be merged. 1-on-1 Private - Select your start date. You will be the only student in the class.
Yes, course requiring practical include hands-on labs.
You can buy online from the page by clicking on "Buy Now". You can view alternate payment method on payment options page.
Yes, you can pay from the course page and flexi page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You can request a refund if you do not wish to enroll in the course.
To receive an acknowledgment of your online payment, you should have a valid email address. At the point when you enter your name, Visa, and other data, you have the option of entering your email address. Would it be a good idea for you to decide to enter your email address, confirmation of your payment will be emailed to you.
After you submit your payment, you will land on the payment confirmation screen. It contains your payment confirmation message. You will likewise get a confirmation email after your transaction is submitted.
We do accept all major credit cards from Visa, Mastercard, American Express, and Discover.
Credit card transactions normally take 48 hours to settle. Approval is given right away; however, it takes 48 hours for the money to be moved.
Yes, we do accept partial payments, you may use one payment method for part of the transaction and another payment method for other parts of the transaction.
Yes, if we have an office in your city.
Yes, we do offer corporate training More details
Yes, we do.
Yes, we also offer weekend classes.
Yes, Koenig follows a BYOL(Bring Your Own Laptop) policy.
It is recommended but not mandatory. Being acquainted with the basic course material will enable you and the trainer to move at a desired pace during classes. You can access courseware for most vendors.
Yes, this is our official email address which we use if a recipient is not able to receive emails from our @koenig-solutions.com email address.
Buy-Now. Pay-Later option is available using credit card in USA and India only.
You will receive the digital certificate post training completion via learning enhancement tool after registration.
Yes you can.
Yes, we do. For details go to flexi
You can pay through debit/credit card or bank wire transfer.
Dubai, London, Sydney, Singapore, New York, Delhi, Goa, Bangalore, Chennai and Gurugram.
Yes you can request your customer experience manager for the same.
Yes of course. 100% refund if training not upto your satisfaction.

Prices & Payments

Yes of course.
Yes, We are

Travel and Visa

Yes we do after your registration for course.

Food and Beverages

Yes.

Others

Says our CEO-
“It is an interesting story and dates back half a century. My father started a manufacturing business in India in the 1960's for import substitute electromechanical components such as microswitches. German and Japanese goods were held in high esteem so he named his company Essen Deinki (Essen is a well known industrial town in Germany and Deinki is Japanese for electric company). His products were very good quality and the fact that they sounded German and Japanese also helped. He did quite well. In 1970s he branched out into electronic products and again looked for a German name. This time he chose Koenig, and Koenig Electronics was born. In 1990s after graduating from college I was looking for a name for my company and Koenig Solutions sounded just right. Initially we had marketed under the brand of Digital Equipment Corporation but DEC went out of business and we switched to the Koenig name. Koenig is difficult to pronounce and marketeers said it is not a good choice for a B2C brand. But it has proven lucky for us.” – Says Rohit Aggarwal (Founder and CEO - Koenig Solutions)
All our trainers are fluent in English . Majority of our customers are from outside India and our trainers speak in a neutral accent which is easily understandable by students from all nationalities. Our money back guarantee also stands for accent of the trainer.
Medical services in India are at par with the world and are a fraction of costs in Europe and USA. A number of our students have scheduled cosmetic, dental and ocular procedures during their stay in India. We can provide advice about this, on request.
Yes, if you send 4 participants, we can offer an exclusive training for them which can be started from Any Date™ suitable for you.