Managing Device Security
This module explains how to mitigate security threats with the use of Security Compliance Manager, Enhanced Mitigation Experience Toolkit, and security settings in GPOs. It also describes User Account Control (UAC), and how to configure it.
Lessons
- Using Security Settings to Mitigate Threats
- Configuring User Account Control
Lab: Managing Device Security
- Creating Security Policies
- Testing Security Policies
- Configuring UAC Prompts
After completing this module, students will be able to:
- Use security settings to mitigate threats.
- Configure user account control.