Configure and manage host security
Learn to lock down the devices, virtual machines, and other components that run your applications in Azure.
Learning objectives
By the end of this module, you will be able to:
- Configure and deploy Endpoint Protection
- Deploy a privileged access strategy for devices and privileged workstations
- Secure your virtual machines and access to them
- Deploy Windows Defender
- Practice layered security by reviewing and implementing Security Center and Security Benchmarks
Prerequisites
- None