Configuring Endpoint Security
Welcome to the Configuring Endpoint Security Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Configuring Endpoint Security Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Use anti-virus Programs
- Install and configure an anti-spyware application
- Create an Endpoint Protection site system role
- Configure alerts for Endpoint Protection
- Configure definition updates for Endpoint Protection
- Create and deploy antimalware policies for Endpoint Protection
- Configure custom client settings for Endpoint Protection
- Provision the Endpoint Protection client in a disk image
After completing this lab, you will be able to:
- Update Windows Defender
- Use an Online Anti-Malware Scanner
- Explore Internet Explorer Browser Security
- Install an Antispyware
- Use SUPERAntiSpyware
- Install an Endpoint Protection Site System Role
- Configure Alerts for Endpoint Protection
- Configure Definition Updates
- Create and Deploy Antimalware Policies for Endpoint Protection
- Configure Client Settings for Endpoint Protection
- Verify the Endpoint Protection Client Installation
- Configure the Endpoint Protection Client
- Verify the Endpoint Protection Client Installation
Exam Objectives
The following exam objectives are covered in this lab:
- CAS-003 2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements..
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1 - Use Anti-virus Programs
Most operating systems have built-in anti-malware programs that may help with warding off the virus, unwanted email messages, spyware and other annoyances that can cause anomalies within a computer system.
In this exercise, you will explore a built-in anti-malware application in Windows 10 called Microsoft Security Essentials.
Learning Outcomes
After completing this exercise, you will be able to:
- Update Windows Defender
- Use an Online Anti-Malware Scanner
- Exploring Internet Explorer Browser Security
Exercise 2 - Use Anti Spyware
An anti-spyware program is designed to catch spyware in your system, which cannot be caught with a usual antivirus program. Spyware is a malware that silently sits inside your system and collects information. There are different activities that spyware can perform, some of which are installing additional software without your knowledge or redirect your Web browser to an unwanted Website.
Learning Outcomes
After completing this exercise, you will be able to:
- Install Antispyware
- Use SUPERAntiSpyware
Exercise 3 - Installing an Endpoint Protection Site System Role
Before using Endpoint Protection, the Endpoint Protection site system role must be installed on any one site system server. In this exercise, you will learn how to install an Endpoint Protection site system role.
Learning Outcomes
After completing this exercise, you will be able to:
- Install an Endpoint Protection Site System Role
- Configure Alerts for Endpoint Protection
Exercise 4 - Configure Definition Updates for Endpoint Protection
With Endpoint Protection, you can update antimalware definitions on client computers.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure Definition Updates
Exercise 5 - Create and Deploy Antimalware policies for Endpoint Protection
The Configuration Manager allows you to deploy antimalware policies and specify how Endpoint Protection protects them from malware and other threats. You can include information about the scan schedule, the actions to take when malware is detected and the types of files and folder to scan in the antimalware policy setting.
Learning Outcomes
After completing this exercise, you will be able to:
- Create and Deploy Antimalware Policies for Endpoint Protection
Exercise 6 - Configure Custom Client Settings for Endpoint Protection
In this exercise, you will configure client settings for Endpoint Protection. You can deploy these settings to a collection of computers in the hierarchy.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure Client Settings for Endpoint Protection
- Verify the Endpoint Protection Client Installation
Exercise 7 - Provision Endpoint Protection
In this exercise, you will learn how to provision the Endpoint Protection client on a computer that is to be used as a disk image source for Configuration Manager operating system deployment. This computer is referred to as a reference computer.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure the Endpoint Protection Client
- Verify the Endpoint Protection Client Installation
See the full benefits of our immersive learning experience with interactive courses and guided career paths.