Lynda - Learning System Center 2016 Endpoint Protection
    
    File List
    
        
            
                
                    - 4. 3. Endpoint Protection Policies/19. Configure an Automatic Deployment Rule.mp4  19.3 MB
 
                
                    - 5. 4. Monitoring Endpoint Protection/26. Reports.mp4  14.8 MB
 
                
                    - 5. 4. Monitoring Endpoint Protection/23. Using PowerShell cmdlets for monitoring.mp4  13.5 MB
 
                
                    - 5. 4. Monitoring Endpoint Protection/22. In-console monitoring.mp4  12.4 MB
 
                
                    - 5. 4. Monitoring Endpoint Protection/24. Client logs and WMI queries.mp4  12.0 MB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/11. Deploy the SCEP Windows client.mp4  11.9 MB
 
                
                    - 4. 3. Endpoint Protection Policies/15. Custom policies and priority order.mp4  10.5 MB
 
                
                    - 4. 3. Endpoint Protection Policies/16. Policy settings.mp4  10.4 MB
 
                
                    - 5. 4. Monitoring Endpoint Protection/25. Alerts and subscriptions.mp4  10.1 MB
 
                
                    - 4. 3. Endpoint Protection Policies/17. Configure custom policies.mp4  10.0 MB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/09. Server requirements.mp4  9.6 MB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/10. Supported clients.mp4  9.4 MB
 
                
                    - 4. 3. Endpoint Protection Policies/18. Plan an update strategy.mp4  9.4 MB
 
                
                    - 4. 3. Endpoint Protection Policies/14. Default policy.mp4  8.4 MB
 
                
                    - 2. 1. Defining Malware Types/07. Phishing and ransomware.mp4  8.3 MB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/12. Remove malware on a SCEP client.mp4  7.8 MB
 
                
                    - 4. 3. Endpoint Protection Policies/21. Windows Advanced Threat Protection.mp4  7.3 MB
 
                
                    - 2. 1. Defining Malware Types/06. Viruses, trojans, and rootkits.mp4  6.8 MB
 
                
                    - 4. 3. Endpoint Protection Policies/13. Hardening.mp4  6.3 MB
 
                
                    - 2. 1. Defining Malware Types/08. Network vulnerability detection.mp4  6.0 MB
 
                
                    - 1. Introduction/01. Welcome.mp4  5.9 MB
 
                
                    - 4. 3. Endpoint Protection Policies/20. Windows firewall settings.mp4  5.7 MB
 
                
                    - 2. 1. Defining Malware Types/04. Social engineering.mp4  5.3 MB
 
                
                    - 2. 1. Defining Malware Types/05. Spyware and adware.mp4  4.3 MB
 
                
                    - 6. Conclusion/27. Next steps.mp4  3.3 MB
 
                
                    - 1. Introduction/02. What you should know.mp4  1.8 MB
 
                
                    - 1. Introduction/03. How to use the exercise files.mp4  496.5 KB
 
                
                    - 5. 4. Monitoring Endpoint Protection/26. Reports.en.srt  14.3 KB
 
                
                    - 5. 4. Monitoring Endpoint Protection/23. Using PowerShell cmdlets for monitoring.en.srt  12.6 KB
 
                
                    - 4. 3. Endpoint Protection Policies/19. Configure an Automatic Deployment Rule.en.srt  12.2 KB
 
                
                    - 4. 3. Endpoint Protection Policies/15. Custom policies and priority order.en.srt  10.8 KB
 
                
                    - 5. 4. Monitoring Endpoint Protection/22. In-console monitoring.en.srt  10.7 KB
 
                
                    - 2. 1. Defining Malware Types/07. Phishing and ransomware.en.srt  10.4 KB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/10. Supported clients.en.srt  10.0 KB
 
                
                    - 4. 3. Endpoint Protection Policies/16. Policy settings.en.srt  9.7 KB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/09. Server requirements.en.srt  9.4 KB
 
                
                    - 4. 3. Endpoint Protection Policies/18. Plan an update strategy.en.srt  9.2 KB
 
                
                    - 5. 4. Monitoring Endpoint Protection/24. Client logs and WMI queries.en.srt  8.7 KB
 
                
                    - 5. 4. Monitoring Endpoint Protection/25. Alerts and subscriptions.en.srt  8.6 KB
 
                
                    - 4. 3. Endpoint Protection Policies/14. Default policy.en.srt  8.4 KB
 
                
                    - 4. 3. Endpoint Protection Policies/21. Windows Advanced Threat Protection.en.srt  8.3 KB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/11. Deploy the SCEP Windows client.en.srt  8.3 KB
 
                
                    - 4. 3. Endpoint Protection Policies/13. Hardening.en.srt  8.1 KB
 
                
                    - 2. 1. Defining Malware Types/06. Viruses, trojans, and rootkits.en.srt  8.0 KB
 
                
                    - 4. 3. Endpoint Protection Policies/17. Configure custom policies.en.srt  7.2 KB
 
                
                    - 4. 3. Endpoint Protection Policies/20. Windows firewall settings.en.srt  6.8 KB
 
                
                    - 2. 1. Defining Malware Types/08. Network vulnerability detection.en.srt  6.7 KB
 
                
                    - 2. 1. Defining Malware Types/04. Social engineering.en.srt  6.1 KB
 
                
                    - 3. 2 Getting Endpoint Protection Up and Running/12. Remove malware on a SCEP client.en.srt  5.5 KB
 
                
                    - 2. 1. Defining Malware Types/05. Spyware and adware.en.srt  5.4 KB
 
                
                    - 6. Conclusion/27. Next steps.en.srt  2.2 KB
 
                
                    - 1. Introduction/01. Welcome.en.srt  2.2 KB
 
                
                    - 1. Introduction/02. What you should know.en.srt  2.1 KB
 
                
                    - 1. Introduction/03. How to use the exercise files.en.srt  747 bytes
 
                
                    - Exercise Files/04_02/Endpoint_PowerShell_Cmdlets.ps1  323 bytes
 
                
                    - Exercise Files/04_02/Win10_Defender_PowerShell.ps1  148 bytes
 
                
                    - Exercise Files/02_04/ViewDetectedThreats.ps1  116 bytes
 
                
                    - Exercise Files/03_04/ReqQuery_AppliedPolicies.ps1  116 bytes
 
                
                    - Exercise Files/04_03/WMIQuery.ps1  108 bytes
 
                
                    - Exercise Files/04_03/Icon  0 bytes
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.