Endpoint Central – Zero-touch lifecycle

Covers endpoint deployment, configuration, and end-to-end security management. Topics include imaging, encryption, application updates, policy enforcement, and compliance monitoring. Remote management and reporting complete the scope.

Price:

3 000,00 zÅ‚

Polish złoty (zł)
  • Polish zÅ‚oty (zÅ‚)
  • Euro (€)

Description

  1. Deploying a golden image to the endpoint computer
  2. Encrypting the computer to protect data from theft
  3. Updating applications on the endpoint computer
  4. Implementing policies to ensure the computer is properly configured
  5. Remote connection to verify that everything is working properly
  6. Securing USB ports
  7. Securing native applications on the endpoint computer
  8. Securing and configuring web browsers
  9. Checking CIS compliance policies and general computer reports
  • Shop
  • Training categories