About the Course
The Remote Windows Security tool lets you view critical security information in your Configuration Manager console. Information is displayed for the following categories: Defender, Defender Exclusions, Windows Firewall, Firewall Rules, BitLocker, TPM (Trusted Platform Module), Firmware, Virtualization-Based Security.
To view security information in your Configuration Manager console, navigate to Assets and Compliance > Devices > Right Click Tools > Security Tools > Remote Windows Security.
Disclaimer: This course is intended for those with a certain level of understanding, generally this level of knowledge would be a portion of an IT system administrators collective. While anyone at any level can take this course please know that there are some underlying assumptions we are making, some of the technologies we discuss or best practices we reference may be beyond an entry level of understanding. Don't be discouraged, through the power of learning you can become the best of yourself, if you have questions please feel free to research on your own. If there are any Recast specific queries please feel free to reach out to us.
Course Categories
Course Instructor
-
Introduction
- Welcome
- Intro Video
-
Features
- Defender and Defender Exclusions
- Windows Firewall and Firewall Rules
- BitLocker and TPM
- Firmware and Virtualization-Based Security
- Features Overview Video
-
Scenarios
- RWS Scenarios Video
-
Knowledge Checkpoint
- RWS Checkpoint
- RWS Checkpoint Answer Key
-
Wrap Up
- Conclusion
About the Course
The Remote Windows Security tool lets you view critical security information in your Configuration Manager console. Information is displayed for the following categories: Defender, Defender Exclusions, Windows Firewall, Firewall Rules, BitLocker, TPM (Trusted Platform Module), Firmware, Virtualization-Based Security.
To view security information in your Configuration Manager console, navigate to Assets and Compliance > Devices > Right Click Tools > Security Tools > Remote Windows Security.
Disclaimer: This course is intended for those with a certain level of understanding, generally this level of knowledge would be a portion of an IT system administrators collective. While anyone at any level can take this course please know that there are some underlying assumptions we are making, some of the technologies we discuss or best practices we reference may be beyond an entry level of understanding. Don't be discouraged, through the power of learning you can become the best of yourself, if you have questions please feel free to research on your own. If there are any Recast specific queries please feel free to reach out to us.
-
Introduction
- Welcome
- Intro Video
-
Features
- Defender and Defender Exclusions
- Windows Firewall and Firewall Rules
- BitLocker and TPM
- Firmware and Virtualization-Based Security
- Features Overview Video
-
Scenarios
- RWS Scenarios Video
-
Knowledge Checkpoint
- RWS Checkpoint
- RWS Checkpoint Answer Key
-
Wrap Up
- Conclusion