Introduction

Completed

Part of protecting Windows is to take a defense-in-depth approach. Threats come in many forms and can target a variety of specific services or applications. Administrators should assume that no single solution will be able to mitigate all threats and should be familiar with the tools and settings available to help secure devices.

Objectives

After completing this module, you will be able to:

  • Describe the features and use of the Security Compliance Toolkit
  • Describe the features of AppLocker
  • Describe methods of securing data in the enterprise
  • Describe the benefits and features of Microsoft Defender for Endpoint