Microsoft Desktop, Part 8 of 8: Security and Infrastructure

with expert Chris Bell

Key threats from the desktop end points of data leakage, misuse of software licenses, unprotected devices and improper configuration of privileges are key threats to an enterprise infrastructure. Microsoft offers a wide variety of security options to protect enterprise desktop endpoints from these threats. On the other hand, a desktop infrastructure has various functionalities that enable the smooth functioning of the system. These include the update infrastructure, virtual desktop infrastructure and the virtual desktop, or VD, collection. Through this course we will get familiar with managing desktop security options that we can use to protect desktop systems from malicious data access and malware threats. We will also ensure the smooth functioning of the systems by designing an update infrastructure and installing required updates using the Windows Server Update services, or WSUS.


Intermediate | 1h 45m | December 30, 2013

Windows 2012Security

Course Outline


Chris Bell

Chris Bell, MCITP, is an 18-year SQL Server veteran for both business intelligence and application development providing solutions for businesses, organizations, and individuals. He is the founder and CEO of WaterOx Consulting, Inc., a provider of remote SQL Server consulting and services. Chris is also the founder and current President of the Washington DC chapter of PASS and a member of the Board of Directors for CPCUG. Chris also frequently attends and presents at PASS events around the country, sharing his passion for all things SQL Server. In 2012, Chris was one of 5 finalists in the world for Red Gate’s Exceptional DBA Award.




Explore Our Blogs, Courses and Webinars