Productivity Tools
Showing 709–720 of 1728 results
Implement device compliance
This module describes how to use compliance and conditional access policies to help protect access to organizational resources.
Implement device compliance policies
This module describes how to use compliance and conditional access policies to help protect access to organizational resources.
Implement device data protection
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.
Implement device profiles
Students will learn about the various types of device profiles, and how to create and manage them.
Implement device registration
This module examines the process of device restrigration and discusses how to register and enroll devices in Active Directory.
Implement directory synchronization tools
This module examines the Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync installation requirements, the options for installing and configuring the tools, and how to monitor synchronization services using Microsoft Entra Connect Health.
Implement disaster recovery for SAP workloads in Azure
This module explores disaster recovery support of Azure for SAP workloads, including deployments within single and multiple Azure regions, multi-tier SAP NetWeaver app deployment in Azure, and Azure services, such as Active Directory and DNS.
Implement disaster recovery in Windows Server on-premises and hybrid environments
Learn how to use Hyper-V Replica to provide an affordable BCDR solution for a virtual environment. Learn also how to implement Azure Site Recovery for in on-premises scenarios and to protect your Azure infrastructure.
Implement DNS for Windows Server IaaS VMs
In this module, you'll learn to configure DNS for Windows Server IaaS VMs, choose the appropriate DNS solution for your organization's needs, and run a DNS server in a Windows Server Azure IaaS VM.
Implement dynamic deployment methods
Use dynamic provisioning methods such as Subscription Activation, Provisioning packages, and Microsoft Entra join to reconfigure an existing operating system.
Implement dynamic deployment methods
Use dynamic provisioning methods such as Subscription Activation, Provisioning packages, and Microsoft Entra join to reconfigure an existing operating system.
Implement endpoint protection by using Microsoft Defender for Endpoint
This module examines how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats by using endpoint behavioral sensors, cloud security analytics, and threat intelligence.