From the course: Deploying and Managing Defender for Endpoint for Windows
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Onboarding methods and recommendations
From the course: Deploying and Managing Defender for Endpoint for Windows
Onboarding methods and recommendations
- [Instructor] To onboard a device into Defender for Endpoint means to connect it to Defender for Endpoint. On Windows 10 and later, this means enabling a built in set of services, but on older versions of Windows, it means actually deploying those services. Now after a device is onboarded, it can be managed using Security Settings Management, and it's going to start to transmit telemetry that's surfaced into the Defender portal. That's going to give you inventory information, security recommendations, and then also threat response. How we perform the onboarding? That's going to vary depending on the management tools we have available and the operating system type. So, before we actually dive in to demonstrating how to perform the onboarding, let's review all the available methods, and then which may be preferable. First up, we've got good old fashioned batch scripting. This is our manual option and is really for tiny scale scenarios such as testing. So for example, if we use this…
Contents
-
-
-
-
(Locked)
Onboarding methods and recommendations5m 9s
-
(Locked)
Onboarding Windows manually9m 25s
-
(Locked)
Onboarding Windows with Intune2m 29s
-
(Locked)
Onboarding Windows with Configuration Manager4m 13s
-
(Locked)
Onboarding Windows with Group Policy8m 53s
-
(Locked)
Onboarding Windows with Defender for Cloud4m 18s
-
(Locked)
-
-
-
-