A priority value for policies determines the precedence when a device is affected by multiple policies.
- [Instructor] In this demonstration,…we're going to take a look end to end…at configuring a custom policy…and then deploying it to a device collection.…So to do this, we start within the SCCM console,…and we go to the Assets and Compliance workspace,…and in the left-hand navigator…we go down under Endpoint Protection,…and we click on Antimalware Policies.…Now from here, you could right click on Antimalware Policies…and either create a new policy,…import it, xml file format, or manage an existing one.…We're going to do it from scratch,…so I'm going to create an antimalware policy,…in this case, called Las Vegas.…
Now I would do this…because I know I've already got a collection of machines,…ideally organized in a collection,…called, ideally, Las Vegas,…but the name doesn't have to match.…So now what I'm going to do is determine…which category of endpoint protection client settings…I want applied.…So in this case, I'm going to turn on…real-time protection and scheduled scans,…but it really depends on your specific needs.…
- Malware types
- Getting Endpoint Protection up and running
- Deploying the SCEP Windows client
- Removing malware on a SCEP client
- Configuring custom policies
- Planning an update strategy
- Windows firewall settings
- Using PowerShell cmdlets for monitoring
Skill Level Beginner
1. Defining Malware Types
2 Getting Endpoint Protection Up and Running
3. Endpoint Protection Policies
4. Monitoring Endpoint Protection
Next steps1m 11s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.