What this book covers
Chapter 1, Planning and Getting Started with System Center Endpoint Protection, walks you through an easy approach to what you need to consider when planning and designing an System Center Configuration Manner hierarchy with the Endpoint Protection in mind. You will gain knowledge of real-life best practices when setting up SCCM.
Chapter 2, Configuring Endpoint Protection in Configuration Manager, walks through all the necessary steps to configure SCCM with Endpoint Protection environment, how to configure Definition Updates, and shows how to run it successfully along with SCCM and WSUS.
Chapter 3, Operations and Maintenance for Endpoint Protection in Configuration Manager, describes the workflow of creation and deploying antimalware policies using SCCM. The chapter also shows how to configure Windows Firewall and monitor the Endpoint Protection clients.
Chapter 4, Updates, dives into advanced and crucial Endpoint Protection update functionalities. This chapter also covers the different supported ways of handling updates, as well as taking in to consideration working with low bandwidth-connected branch offices.
Chapter 5, Security and Privacy for Endpoint Protection in Configuration Manager, focuses on security and privacy concerning SCCM and Endpoint Protection, with some best practices. It gives also the opportunity gain knowledge of Microsoft Security Center with Automatic Sample submission.
Chapter 6, Configuring and Troubleshooting Performance and Advanced Protection, discusses what to consider when thinking of safety and making applications work properly with the antimalware solution and recipes on how to handle OS deployment and BitLocker.
Chapter 7, Troubleshooting and Fixing Issues, provides best practices to troubleshoot SCCM with a focus on Endpoint Protection when it generates errors during its setup and utilization. It starts by tackling major issues presented in SCCM that reflect many other components and explains how to escalate problem resolution using debugging tools and hands-on tips.
Chapter 8, Malware Handling, the best chapter, comes last in this book and provides real-life experience of handling malware with a focus on Endpoint Protection. But in this chapter, you will also gain valuable knowledge about how you can improve your security even more and protect against ransomware.