Overview

Introduction

Welcome to the Configuring Endpoint Security Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Use anti-virus Programs
  • Install and configure an anti-spyware application
  • Create an Endpoint Protection site system role
  • Configure alerts for Endpoint Protection
  • Configure definition updates for Endpoint Protection
  • Create and deploy antimalware policies for Endpoint Protection
  • Configure custom client settings for Endpoint Protection
  • Provision the Endpoint Protection client in a disk image

After completing this lab, you will be able to:

  • Update Windows Defender
  • Use an Online Anti-Malware Scanner
  • Explore Internet Explorer Browser Security
  • Install an Antispyware
  • Use SUPERAntiSpyware
  • Install an Endpoint Protection Site System Role
  • Configure Alerts for Endpoint Protection
  • Configure Definition Updates
  • Create and Deploy Antimalware Policies for Endpoint Protection
  • Configure Client Settings for Endpoint Protection
  • Verify the Endpoint Protection Client Installation
  • Configure the Endpoint Protection Client
  • Verify the Endpoint Protection Client Installation

Exam Objectives

The following exam objectives are covered in this lab:

  • CAS-003 2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements..

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1 - Use Anti-virus Programs

Most operating systems have built-in anti-malware programs that may help with warding off the virus, unwanted email messages, spyware and other annoyances that can cause anomalies within a computer system.

In this exercise, you will explore a built-in anti-malware application in Windows 10 called Microsoft Security Essentials.

Learning Outcomes

After completing this exercise, you will be able to:

  • Update Windows Defender
  • Use an Online Anti-Malware Scanner
  • Exploring Internet Explorer Browser Security

Exercise 2 - Use Anti Spyware

An anti-spyware program is designed to catch spyware in your system, which cannot be caught with a usual antivirus program. Spyware is a malware that silently sits inside your system and collects information. There are different activities that spyware can perform, some of which are installing additional software without your knowledge or redirect your Web browser to an unwanted Website.

Learning Outcomes

After completing this exercise, you will be able to:

  • Install Antispyware
  • Use SUPERAntiSpyware

Exercise 3 - Installing an Endpoint Protection Site System Role

Before using Endpoint Protection, the Endpoint Protection site system role must be installed on any one site system server. In this exercise, you will learn how to install an Endpoint Protection site system role.

Learning Outcomes

After completing this exercise, you will be able to:

  • Install an Endpoint Protection Site System Role
  • Configure Alerts for Endpoint Protection

Exercise 4 - Configure Definition Updates for Endpoint Protection

With Endpoint Protection, you can update antimalware definitions on client computers.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure Definition Updates

Exercise 5 - Create and Deploy Antimalware policies for Endpoint Protection

The Configuration Manager allows you to deploy antimalware policies and specify how Endpoint Protection protects them from malware and other threats. You can include information about the scan schedule, the actions to take when malware is detected and the types of files and folder to scan in the antimalware policy setting.

Learning Outcomes

After completing this exercise, you will be able to:

  • Create and Deploy Antimalware Policies for Endpoint Protection

Exercise 6 - Configure Custom Client Settings for Endpoint Protection

In this exercise, you will configure client settings for Endpoint Protection. You can deploy these settings to a collection of computers in the hierarchy.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure Client Settings for Endpoint Protection
  • Verify the Endpoint Protection Client Installation

Exercise 7 - Provision Endpoint Protection

In this exercise, you will learn how to provision the Endpoint Protection client on a computer that is to be used as a disk image source for Configuration Manager operating system deployment. This computer is referred to as a reference computer.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure the Endpoint Protection Client
  • Verify the Endpoint Protection Client Installation

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.