The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies.
After completing this module, you'll be able to:
Describe the benefits of Modern Management.
Explain the enterprise desktop life-cycle model.
Describe considerations for planning hardware strategies.
Describe considerations for post-deployment and retirement.
Explain the differences between the different editions of Windows.
Select the most suitable Windows device for your needs.
Describe the minimum recommended hardware requirements for installing Windows 11.
Describe RBAC and user roles in Azure AD.
Create and manage users in Azure AD.
Create and manage groups in Azure AD.
Use Windows PowerShell cmdlets to manage Azure AD.
Describe how you can synchronize objects from AD DS to Azure AD.
Describe Azure AD join.
Describe Azure AD join prerequisites, limitations and benefits.
Join device to Azure AD.
Manage devices joined to Azure AD.
Describe Microsoft Endpoint Manager.
Understand the advantages of managing a client with Configuration Manager.
Deploy the Configuration Manager client.
Monitor the Configuration Manager client.
Manage Configuration Manager devices.
In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.
Excellent interaction and answered all of my questions. Looking forward to being able to apply some of the tips and features learned today which hopefully should have real impact on some of the more time consuming tasks currently encountered.
Dublin classroom student
Great course yesterday and can’t give enough amazing feedback for John. I’ve never had a teacher hold attention of a class from start to finish, but yesterday he did this.
GTR = Guarenteed to Run
GTR = Guarenteed to Run
Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.