MCA Microsoft Course MD-100/MD-101/MS-100/MS-101: Microsoft 365 Modern Desktop / MCE: Enterprise Administrator
Course Length: |
12 days |
Certifications: |
Microsoft Certified: Modern Desktop Administrator Associate
MCE: Enterprise Administrator Expert |
Number of Exams: |
4 |
|
- Certified Instructor
- Includes all course materials
|
Gain the skills needed to meet the business needs of a modern organization.
The Modern Desktop Administrator has expertise to deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment.
The Microsoft 365 Enterprise Administrator takes part in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. Master these skills today.
Exams Required:
- Exam MD-100: Windows 10
- Exam MD-101: Managing Modern Desktops
- Exam MS-100: Microsoft 365 Identity and Services
- Exam MS-101: Microsoft 365 Mobility and Security
Microsoft MCA: Microsoft 365 Modern Desktop Administrator Associate
Candidates who earn a Modern Desktop Administrator certification are verified by Microsoft to have the following skills and knowledge:
Deploy Windows
Deploy Windows 10
- configure language packs
- perform a clean installation
- migrate user data
- perform an in-place upgrade (using tools such as MDT, WDS, ADK, etc.)
- select the appropriate Windows edition
- troubleshoot activation issues
Perform post-installation configuration
- configure Edge and Internet Explorer
- configure mobility settings
- configure sign-in options
- customize the Windows desktop
Manage devices and data
Manage local users, local groups, and devices
- manage devices in directories
- manage local groups
- manage local users
Configure data access and protection
- configure NTFS permissions
- configure shared permissions
Configure devices by using local policies
- configure local registry
- implement local policy
- troubleshoot group policies on devices
Manage Windows security
- configure user account control (UAC)
- configure Windows Defender Firewall
- implement encryption
Configure connectivity
Configure networking
- configure client IP settings
- configure mobile networking
- configure VPN client
- troubleshoot networking
- configure Wi-Fi profiles
Configure remote connectivity
- configure remote management
- enable PowerShell Remoting
- configure remote desktop access
Maintain Windows
Configure system and data recovery
- perform file recovery (including OneDrive)
- recover Windows 10
- troubleshoot startup/boot process
Manage updates
- check for updates
- troubleshoot updates
- validate and test updates
- select the appropriate servicing channel
- configure Windows update options
Monitor and manage Windows
- configure and analyze event logs
- manage performance
- manage Windows 10 environment
Deploy and update operating systems
Plan and implement Windows 10 by using dynamic deployment
- evaluate and select an appropriate deployment options
- pilot deployment
- manage and troubleshoot provisioning packages
Plan and implement Windows 10 by using Windows Autopilot
- evaluate and select an appropriate deployment options
- pilot deployment
- create, validate, and assign deployment profile
- extract device HW information to CSV file
- import device HW information to cloud service
- troubleshoot deployment
Upgrade devices to Windows 10
- identify upgrade and downgrade paths
- manage in-place upgrades
- configure a Windows analytics environment
- perform Upgrade Readiness assessment
- migrate user profiles
Manage updates
- configure Windows 10 delivery optimization
- configure Windows Update for Business
- deploy Windows updates
- implement feature updates
- monitor Windows 10 updates
Manage device authentication
- manage authentication policies
- manage sign-on options
- perform Azure AD join
Manage policies and profiles
Plan and implement co-management
- implement co-management precedence
- migrate group policy to MDM policies
- recommend a co-management strategy
Implement conditional access and compliance policies for devices
- implement conditional access policies
- manage conditional access policies
- plan conditional access policies
- implement device compliance policies
- manage device compliance policies
- plan device compliance policies
Configure device profiles
- implement device profiles
- manage device profiles
- plan device profiles
Manage user profiles
- configure user profiles
- configure Enterprise State Roaming in Azure AD
- configure sync settings
- implement Folder Redirection (including OneDrive)
Manage and protect devices
Manage Windows Defender
- implement and manage Windows Defender Application Guard
- implement and manage Windows Defender Credential Guard
- implement and manage Windows Defender Exploit Guard
- implement Windows Defender Advanced Threat Protection
- integrate Windows Defender Application Control
- manage Windows Defender Antivirus
Manage Intune device enrollment and inventory
- configure enrollment settings
- configure Intune automatic enrollment
- enable device enrollment
- enroll non-Windows devices
- enroll Windows devices
- generate custom device inventory reports
- review device inventory
Monitor devices
- monitor device health (e.g., log analytics, Windows Analytics, or other cloud-based tools)
- monitor device security
Manage apps and data
Deploy and update applications
- assign apps to groups
- deploy apps by using Intune
- deploy apps by using Microsoft Store for Business
- deploy O365 ProPlus; enable sideloading of apps into images
- gather Office readiness data
- configure IE Enterprise mode
- configure and implement assigned access or public devices
Implement Mobile Application Management (MAM)
- implement MAM policies
- manage MAM policies
- plan MAM
- configure Windows Information Protection
- implement Azure Information Protection templates
- securing data by using Intune
Microsoft MCE: Microsoft 365 Enterprise Administrator Expert
Candidates who earn an Enterprise Administrator certification are verified by Microsoft to have the following skills and knowledge:
Design and implement Microsoft 365 services
Manage domains
- add and configure additional domains
- configure user identities for new domain name
- configure workloads for new domain name
- design domain name configuration
- set primary domain name
- verify custom domain
Plan a Microsoft 365 implementation
- plan for Microsoft 365 on-premises Infrastructure
- plan identity and authentication solution
Setup Microsoft 365 tenancy and subscription
- configure subscription and tenant roles and workload settings
- evaluate Microsoft 365 for organization
- plan and create tenant
- upgrade existing subscriptions to Microsoft 365
- monitor license allocations
Manage Microsoft 365 subscription and tenant health
- manage service health alerts
- create & manage service requests
- create internal service health response plan
- monitor service health
- configure and review reports, including BI, OMS, and Microsoft 365 reporting
- schedule and review security and compliance reports
- schedule and review usage metrics
Plan migration of users and data
- identify data to be migrated and method
- identify users and mailboxes to be migrated and method
- plan migration of on-prem users and groups
- import PST Files
Manage user identity and roles
Design identity strategy
- evaluate requirements and solution for synchronization
- evaluate requirements and solution for identity management
- evaluate requirements and solution for authentication
Plan identity synchronization by using Azure AD Connect
- design directory synchronization
- implement directory synchronization with directory services, federation services, and Azure endpoints
Manage identity synchronization by using Azure AD Connect
- monitor Azure AD Connect Health
- manage Azure AD Connect synchronization
- configure object filters
- configure password sync
- implement multi-forest AD Connect scenarios
Manage Azure AD identities
- plan Azure AD identities
- implement and manage Azure AD self-service password reset
- manage access reviews
- manage groups
- manage passwords
- manage product licenses
- manage users
- perform bulk user management
Manage user roles
- plan user roles
- allocate roles in workloads
- configure administrative accounts
- configure RBAC within Azure AD
- delegate admin rights
- manage admin roles
- manage role allocations by using Azure AD
- plan security and compliance roles for Microsoft 365
Manage access and authentication
Manage authentication
- design authentication method
- configure authentication
- implement authentication method
- manage authentication
- monitor authentication
Implement Multi-Factor Authentication (MFA)
- design an MFA solution
- configure MFA for apps or users
- administer MFA users
- report MFA utilization
Configure application access
- configure application registration in Azure AD
- configure Azure AD application proxy
- publish enterprise apps in Azure AD
Implement access for external users of Microsoft 365 workloads
- create B2B accounts
- create guest accounts
- design solutions for external access
Plan Office 365 workloads and applications
Plan for Office 365 workload deployment
- identify hybrid requirements
- plan connectivity and data flow for each workload
- plan for Microsoft 365 workload connectivity
- plan migration strategy for workloads
Plan Office 365 applications deployment
- manage Office 365 software downloads
- plan for Office 365 apps
- plan for Office 365 Pro plus apps updates
- plan for Office 365 Pro plus connectivity
- plan for Office online
- plan Office 365 Pro plus deployment
Implement modern device services
Implement Mobile Device Management (MDM)
- plan for MDM
- configure MDM integration with Azure AD
- set an MDM authority
- set device enrollment limit for users
Manage device compliance
- plan for device Compliance
- design Conditional Access Policies
- create Conditional Access Policies
- configure device compliance policy
- manage Conditional Access Policies
Plan for devices and apps
- create and configure Microsoft Store for Business
- plan app deployment
- plan device co-management
- plan device monitoring
- plan for device profiles
- plan for Mobile Application Management
- plan mobile device security
Plan Windows 10 deployment
- plan for Windows as a Service (WaaS)
- plan the appropriate Windows 10 Enterprise deployment method
- analyze upgrade readiness for Windows 10
- evaluate and deploy additional Windows 10 Enterprise security features
Implement Microsoft 365 security and threat management
Implement Cloud App Security (CAS)
- configure Cloud App Security (CAS)
- configure Cloud App Security (CAS) policies
- configure Connected apps
- design cloud app security (CAS) Solution
- manage Cloud App Security (CAS) alerts
- upload cloud app security (CAS) traffic logs
Implement threat management
- plan a threat management solution
- design Azure Advanced Threat Protection (ATP) Policies
- design Microsoft 365 ATP Policies
- configure Azure ATP Policies
- configure Microsoft 365 ATP Policies
- monitor Advanced Threat Analytics (ATA) incidents
Implement Windows Defender Advanced Threat Protection (ATP)
- plan Windows Defender ATP Solution
- configure preferences
- implement Windows Defender ATP Policies
- enable and configure security features of Windows 10 Enterprise
Manage security reports and alerts
- manage service assurance dashboard
- manage tracing and reporting on Azure AD Identity Protection
- configure and manage Microsoft 365 security alerts
- configure and manage Azure Identity Protection dashboard and alerts
Manage Microsoft 365 governance and compliance
Configure Data Loss Prevention (DLP)
- configure DLP Policies
- design data retention policies in Microsoft 365
- manage DLP exceptions
- monitor DLP policy matches
- manage DLP policy matches
Implement Azure Information Protection (AIP)
- plan AIP solution
- plan for deployment On-Prem rights management Connector
- plan for Windows information Protection (WIP) implementation
- plan for classification labeling
- configure Information Rights Management (IRM) for Workloads
- configure Super User
- deploy AIP Clients
- implement Azure Information Protection policies
- implement AIP tenant key
Manage data governance
- configure information retention
- plan for Microsoft 365 backup
- plan for restoring deleted content
- plan information Retention Policies
Manage auditing
- configure audit log retention
- configure audit policy
- monitor Unified Audit Logs
Manage eDiscovery
- search content by using Security and Compliance Center
- plan for in-place and legal hold
- configure eDiscovery
IPLearning.net is your best choice for Microsoft MCA MCE 365,
Microsoft MCA MCE 365 training,
Microsoft MCA MCE 365 certification,
Microsoft MCA MCE 365 certification boot camp,
Microsoft MCA MCE 365 boot camp,
Microsoft MCA MCE 365 certification training,
Microsoft MCA MCE 365 boot camp training,
Microsoft MCA MCE 365 boot camp certification,
Microsoft MCA MCE 365 certification course,
Microsoft MCA MCE 365 course,
training Microsoft MCA MCE 365,
certification Microsoft MCA MCE 365,
boot camp Microsoft MCA MCE 365,
certification Microsoft MCA MCE 365 boot camp,
certification Microsoft MCA MCE 365 training,
boot camp Microsoft MCA MCE 365 training,
certification Microsoft MCA MCE 365 course.
|