Enhance endpoint security with Microsoft Intune and Microsoft Security Copilot
(MD-4011)
This Course will empower IT professionals and security analysts with the expertise to utilize Microsoft Intune and Microsoft Security Copilot effectively in device management and security operations. This course directs learners towards optimizing Intune for enhanced security and integrating Security Copilot to strengthen their organization's security stance.
Audience Profile
This course is designed for Endpoint Administrators and Security Analysts proficient in basic device management and security operations.
Prerequisites
- Basic understanding of IT security principles
- Familiarity with Microsoft 365, Microsoft Intune, and Microsoft Entra ID
- (Optional) Access to Microsoft Intune and Microsoft Security Copilot for hands-on practice
Course Syllabus
Prepare Microsoft Entra ID and Intune for device management
Learn how to configure identity, licensing, and tenant settings to enable device enrollment in Microsoft Intune. Explore manual enrollment, Windows Autopilot, and BYOD scenarios to prepare your organization for modern endpoint management.
- Introduction
- Set up Microsoft Entra ID roles and licensing
- Configure your tenant for device onboarding
- Choose and explain enrollment methods
- Knowledge check
- Summary
Enroll and validate devices with Microsoft Intune
Perform hands-on device enrollment in Microsoft Intune, validate device join and management status, configure enrollment restrictions, and troubleshoot common enrollment issues to ensure devices are successfully managed.
- Introduction
- Exercise: Enroll a device
- Validate device join and management
- Apply platform and ownership restrictions
- Troubleshoot device enrollment
- Knowledge check
- Summary
Configure and secure devices with Microsoft Intune policies
Learn to create and deploy configuration profiles, implement compliance policies, use dynamic groups for targeting, and automate remediation for noncompliant devices in Microsoft Intune.
- Introduction
- Create and assign configuration profiles
- Create and assign compliance policies
- Target policies with dynamic groups
- Exercise - Assign and validate device policies
- Automate remediation for noncompliance
- Knowledge check
- Summary
Protect data and control access with Microsoft Intune and Conditional Access
Protect corporate data on managed and unmanaged devices using Microsoft Intune app protection policies. Control access to organizational resources with Microsoft Entra Conditional Access policies that enforce compliance and security requirements.
- Introduction
- Protect organizational data with app protection policies
- Control resource access with Conditional Access policies
- Exercise - Protect data and control access with policies
- Knowledge check
- Summary
Harden endpoints and monitor security with Microsoft Intune and Defender for Endpoint
Strengthen endpoint security by deploying Microsoft security baselines, onboarding devices to Microsoft Defender for Endpoint, and configuring attack surface reduction rules. Monitor security posture and respond to threats using integrated security operations tools.
- Introduction
- Harden device security with security baselines
- Enable advanced threat protection with Microsoft Defender for Endpoint
- Prevent exploitation with attack surface reduction
- Exercise - Harden and monitor endpoints with security policies
- Knowledge check
- Summary
Accelerate endpoint remediation and response with Microsoft Security Copilot
Leverage AI-powered investigation capabilities with Microsoft Security Copilot to analyze security incidents, troubleshoot device issues, and generate remediation recommendations across Microsoft Intune and Defender for Endpoint.
- Introduction
- Microsoft Security Copilot overview
- Investigate security incidents with Copilot
- Device troubleshooting with Copilot in Intune
- Exercise: Investigate and respond with Security Copilot
- Knowledge check
- Summary

