Microsoft Desktop, Part 8 of 8: Security and Infrastructure

with Chris Bell

Key threats from the desktop end points of data leakage, misuse of software licenses, unprotected devices and improper configuration of privileges are key threats to an enterprise infrastructure. Microsoft offers a wide variety of security options to protect enterprise desktop endpoints from these threats. On the other hand, a desktop infrastructure has various functionalities that enable the smooth functioning of the system. These include the update infrastructure, virtual desktop infrastructure and the virtual desktop, or VD, collection. Through this course we will get familiar with managing desktop security options that we can use to protect desktop systems from malicious data access and malware threats. We will also ensure the smooth functioning of the systems by designing an update infrastructure and installing required updates using the Windows Server Update services, or WSUS.

Course Outline