Microsoft Desktop, Part 8 of 8: Security and Infrastructure
Interactive

Microsoft Desktop, Part 8 of 8: Security and Infrastructure

LearnNow Online
Updated Aug 23, 2018

Course description

Key threats from the desktop end points of data leakage, misuse of software licenses, unprotected devices and improper configuration of privileges are key threats to an enterprise infrastructure. Microsoft offers a wide variety of security options to protect enterprise desktop endpoints from these threats. On the other hand, a desktop infrastructure has various functionalities that enable the smooth functioning of the system. These include the update infrastructure, virtual desktop infrastructure and the virtual desktop, or VD, collection. Through this course we will get familiar with managing desktop security options that we can use to protect desktop systems from malicious data access and malware threats. We will also ensure the smooth functioning of the systems by designing an update infrastructure and installing required updates using the Windows Server Update services, or WSUS.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

The course assumes that students have some familiarity with Microsoft Windows, basic networking concepts, and a fundamental understanding of computer hardware.


Meet the expert

Chris Bell

Chris Bell, MCITP, is an 18-year SQL Server veteran for both business intelligence and application development providing solutions for businesses, organizations, and individuals. He is the founder and CEO of WaterOx Consulting, Inc., a provider of remote SQL Server consulting and services. Chris is also the founder and current President of the Washington DC chapter of PASS and a member of the Board of Directors for CPCUG. Chris also frequently attends and presents at PASS events around the country, sharing his passion for all things SQL Server. In 2012, Chris was one of 5 finalists in the world for Red Gate’s Exceptional DBA Award.

Video Runtime

105 Minutes

Time to complete

145 Minutes

Course Outline

Managing Desktop Security

Advanced Auditing (07:22)

  • Introduction (00:18)
  • Advanced Auditing (01:05)
  • UAC (01:10)
  • Device Restriction Policies (01:33)
  • Demo: Advanced Auditing (03:02)
  • Summary (00:11)

Endpoint Protection (16:03)

  • Introduction (00:19)
  • Implement Endpoint Protection (00:55)
  • Endpoint Protection Features (01:12)
  • Endpoint Protection Alerts (00:29)
  • Client Settings (00:41)
  • Demo: Endpoint Protection Set-Up (03:45)
  • Demo: Client Settings (02:18)
  • Demo: Create Automatic Rule (03:52)
  • Demo: Deployment Package (02:18)
  • Summary (00:10)

Anti Malware Protection (05:28)

  • Introduction (00:15)
  • Anti-MalwareProtectionPolicies (00:52)
  • Demo: Anti-Malware Protection (03:57)
  • Summary (00:22)

System Center 2012 DPM (11:27)

  • Introduction (00:23)
  • System Center 2012 DPM (00:43)
  • Demo: DPM Setup (01:53)
  • Demo: DPM Alerts (04:42)
  • Demo: Operations Manager (03:29)
  • Summary (00:14)

Bit Locker (14:44)

  • Introduction (00:26)
  • BitLocker (02:04)
  • BitLocker Modes (00:36)
  • BitLocker Recovery Key (00:37)
  • Demo: Enable BitLocker (02:39)
  • Demo: New Drive (03:45)
  • Demo: BitLocker (04:15)
  • Summary (00:18)

Removable Media (05:20)

  • Introduction (00:25)
  • Removable Media Restrictions (01:59)
  • Demo: Removable Media Rules (02:45)
  • Summary (00:09)

Encrypting File System (09:20)

  • Introduction (00:25)
  • EFS (00:55)
  • Centrally Managed EFS Solutions (01:24)
  • Demo: EFS Folder (01:50)
  • Demo: EFS Certificates (04:34)
  • Summary (00:11)
Desktop Infrastructure

Windows Update Infrastructure (12:41)

  • Introduction (00:35)
  • WSUS (00:43)
  • VM Pool Patching (00:59)
  • VM Manager Integration (00:58)
  • WSUS and SCCM Integration (01:04)
  • Multi-Tier WSUS (00:56)
  • Replica WSUS Servers (00:30)
  • Windows Intune (01:02)
  • UpdateInfrastructureGuidelines (00:41)
  • Demo: Updates with SCCM (04:50)
  • Summary (00:18)

Monitor Virtual Infrastructure (15:29)

  • Introduction (00:23)
  • VDI (01:19)
  • RDS Servers (01:00)
  • RDS Capacity Analysis (01:11)
  • Bottleneck Remediation (01:17)
  • VM Guests (00:30)
  • Health Monitoring (00:53)
  • RD Session Host Server (00:55)
  • Re-Direction Modes (00:57)
  • VDI Performance Factors (01:14)
  • Demo: RDS Monitoring (02:40)
  • Demo: VDI Monitoring (02:50)
  • Summary (00:16)

Manage Virtual Collections (07:27)

  • Introduction (00:30)
  • Pooled VD Collection (01:18)
  • Personal VD Collection (00:43)
  • Managed Collection (01:02)
  • Unmanaged Collection (00:37)
  • Demo: Monitor VDs (02:54)
  • Summary (00:21)
;