Explore Device Guard technology. Device guard enables companies to lock down a Windows device so that only approved apps and programs can run. The PC must run Windows 10 Enterprise, have UEFI firmware and secure boot, and meet other requirements. An enterprise must plan for and implement the required infrastructure as well, devices should be categorized, and so on.
- [Instructor] Employees often use their own laptops,…tablets, and other devices to access corporate resources.…Sometimes they use devices provisioned by the company.…Whatever the case, it's part of a Network Administrator's…job to protect those devices from harm.…They do this in part by limiting what apps can run…on any given machine.…When Admins limit a device so that it can only run…trusted apps, the device is protected from anything…deemed untrusted.…This technology is called Device Guard.…
The Device Guard works by incorporating…existing virtualization, security,…and code integrity policies.…Security includes things like secure boot…and second-level address translation.…Code integrity policies define what apps are trusted.…Once set up, Device Guard protects the computer…from malware and unsigned code, boot kits,…and even physically present attackers…Administrators can manage Device Guard in many ways,…including group policy, SCCM, Intune and PowerShell.…
What they choose depends on their current infostructure.…
Note: The course also maps to the third part of MCSA exam 70-698, Installing and Configuring Windows 10. Taking this course will prepare you for objectives in the Manage and Maintain Windows domain of the test.
- Configuring Windows Update
- Updating Windows apps
- Reviewing event logs
- Using Resource Monitor and Performance Monitor
- Managing security with Windows Defender
- Creating a recovery drive
- Restoring and recovering files
- Recovering the OS with Windows Recovery
- Configuring authorization and authentication
- Securing Windows 10 with passwords
- Joining workgroups and domains
- Creating and using accounts
- Automating tasks with PowerShell
Skill Level Intermediate
1. Configure Updates
2. Monitor Windows
3. Configure System and Data Recovery
4. Configure Authorization and Authentication
5. Configure Advanced
Next steps1m 13s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.