Summary
In this chapter, we examined how MDE can be used to protect your organization’s devices. You learned how to plan your MDE implementation by being aware of the licensing requirements and compatible operating systems, how to create your MDE instance, and how to manage and monitor the service. We also examined Microsoft Defender Application Guard and Microsoft Defender Exploit Guard, and learned about how these features can complement the core features and can be deployed by different methods, including System Center Configuration Manager, Group Policy, and Microsoft Intune. Finally, we explored how BitLocker can apply data protection and encryption to your Windows devices in order to safeguard them from loss, theft, or poor decommissioning practices, and how application protection policies can be used to protect non-Windows devices.
The next chapter will discuss message protection with Microsoft Defender for Office 365. You will learn how you can protect your emails...