Administering Microsoft Endpoint Configuration Manager

About Course

Course Objective:

  • Understand the architecture and components of Microsoft Endpoint Configuration Manager

  • Manage enterprise devices including computers and mobile devices

  • Configure resource discovery, boundaries, and device collections

  • Deploy and manage the Configuration Manager client

  • Collect and manage hardware and software inventory

  • Distribute and manage content for deployments

  • Deploy and manage enterprise applications

  • Configure and manage software updates for managed devices

  • Implement Microsoft Defender Endpoint Protection policies

  • Configure compliance settings and manage secure data access

  • Deploy and manage operating systems across enterprise environments

  • Monitor, maintain, and troubleshoot a Configuration Manager site

Course Outlines:

Managing computers and mobile devices in the enterprise

  • Overview of systems management by using enterprise management solutions
  • Overview of the Configuration Manager architecture
  • Overview of the Configuration Manager administrative tools
  • Tools for monitoring and troubleshooting a Configuration Manager site
  • Lab 1: Exploring the Configuration Manager tools

Analyzing data using queries, reports, and CMPivot

  • Introduction to queries
  • Configuring SQL Server Reporting Services
  • Analyzing the real-time state of a device by using CMPivot
  • Lab 1: Creating and running queries
  • Lab 2: Configuring SSRS
  • Lab 3: Analyzing the real-time state of a device by using CMPivot

Preparing the Configuration Manager management infrastructure

  • Configuring site boundaries and boundary groups
  • Configuring resource discovery
  • Organizing resources using device and user collections
  • Lab 1: Configuring boundaries and resource discovery
  • Lab 2: Configuring user and device collections

Deploying and managing the Configuration Manager client

  • Overview of the Configuration Manager client
  • Deploying the Configuration Manager client
  • Configuring and monitoring client status
  • Managing client settings and performing management operations
  • Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software
  • Lab 2: Configuring and monitoring client status
  • Lab 3: Managing client settings

Managing inventory for PCs and applications

  • Overview of inventory collection
  • Configuring hardware and software inventory
  • Managing inventory collection
  • Configuring software metering
  • Configuring and managing Asset Intelligence
  • Lab 1: Configuring and managing inventory collection
  • Lab 2: Configuring software metering
  • Lab 3: Configuring and managing Asset Intelligence

Distributing and managing content used for deployments

  • Preparing the infrastructure for content management
  • Distributing and managing content on distribution points
  • Lab 1: Distributing and managing content for deployments

Deploying and managing applications

  • Overview of application management
  • Creating applications
  • Deploying applications
  • Managing applications
  • Deploying and managing Windows apps
  • Lab 1: Creating and deploying applications
  • Lab 2: Managing application supersedence and removal
  • Lab 3: Using Configuration Manager to deploy Windows apps

Maintaining software updates for managed PCs

  • The software updates process
  • Preparing a Configuration Manager site for software updates
  • Managing software updates
  • Configuring automatic deployment rules
  • Monitoring and troubleshooting software updates
  • Enabling third-party updates
  • Lab 1: Configuring the site for software updates
  • Lab 2: Deploying and managing software updates

Implementing Defender Protection for managed PCs

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring, deploying, and monitoring Endpoint Protection policies
  • Configuring and deploying advanced threat policies
  • Lab 1: Implementing Endpoint Protection
  • Lab 2: Implementing advanced threat policies

Managing compliance and secure data access

  • Overview of Compliance Settings
  • Configuring compliance settings
  • Viewing compliance results
  • Managing resource and data access
  • Lab 1: Managing compliance settings

Managing operating system deployment

  • An overview of operating system deployment
  • Preparing a site for operating system deployment
  • Deploying an operating system
  • Managing Windows as a service
  • Lab 1: Preparing the site for operating-system deployment
  • Lab 2: Deploying operating-system images for bare-metal installations

Managing and maintaining a Configuration Manager site

  • Configuring role-based administration
  • Configuring Remote Tools
  • Overview of Configuration Manager site maintenance and Management Insights
  • Backing up and recovering a Configuration Manager site
  • Updating the Configuration Manager infrastructure
  • Lab 1: Configuring role-based administration
  • Lab 2: Configuring Remote Tools
  • Lab 3: Maintaining a Configuration Manager site

World Food Programme (WFP)

Our work with the World Food Programme (WFP) focused on enabling the effective adoption of digital field technologies and essential digital literacy capabilities. Participants utilized mobile-based data collection platforms within operational contexts, enhancing accuracy, consistency, and confidence in digital data handling. The engagement strengthened WFP’s ability to rely on digital tools to support field operations and humanitarian programs.

Raya

For Raya, we delivered technology enablement focused on automation-driven operations and scalable application development. Participants gained hands-on experience with automation technologies and modern front-end development frameworks, supporting more efficient processes and the delivery of flexible, high-performance digital solutions aligned with business growth objectives.

EgyptAir

Our engagement with EgyptAir focused on enabling the effective use of application development technologies alongside the adoption of cybersecurity and secure computing practices within operational environments. Participants worked with Microsoft-based development platforms and programming technologies while gaining practical exposure to secure application usage, access control mechanisms, and threat-aware system interaction. This integrated technology enablement supported more secure digital operations, improved system reliability, and reinforced cyber resilience across aviation technology environments.

Banque Misr

We collaborated with Banque Misr to enable integrated enterprise technology capabilities across multiple domains. The engagement supported effective utilization of IT infrastructure environments, data analytics platforms, and professional capability development frameworks, allowing teams to operate confidently within complex enterprise systems. Our delivery approach focused on practical technology adoption, operational alignment, and building sustainable competencies that support reliable banking services and informed, data-driven decision-making.

Course Booking Form