MD-100T03-A: Protecting Windows 10


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Upcoming Dates

Sep 19 2022
09:00 - 17:00

Oct 17 2022
09:00 - 17:00

Nov 14 2022
09:00 - 17:00

Dec 12 2022
09:00 - 17:00

Jan 9 2023
09:00 - 17:00

Feb 6 2023
09:00 - 17:00

  • MD-100T03-A: Protecting Windows 10
    1 days  (Instructor Led Online)  |  Microsoft 365 - Modern Desktop Administrator

    Course Details

    In this Protecting Windows 10 (MD-100T03-A) course, students will learn how to secure the Windows 10 OS and protect the data on the device.

    In this course, students will be introduced to common methods used for authentication and access control. This course will teach how to configure file and folder permissions and create security policies. Students will also be introduced to the different types of external threats and how to leverage features like encryption and firewalls, as well as tools like Windows Defender.


    See other Microsoft courses available


    Module 1: Configuring Authorization & Authentication

    This module introduces the tools and features of Windows 10 for authorizing access to Windows 10 clients. Students will learn about methods for how users sign-in to Windows 10. This module also covers restricting what users can or cannot do on a device through methods like User Account Control (UAC) and account types.


    • Using Security Settings to Mitigate Threats
    • Configuring UAC
    • Implementing Device Registration
    • Authentication

    After completing this module, students will be able to:

    • Describe the different methods for securing data and the Windows 10 OS.
    • Describe the different types of user and service accounts.
    • Configure Windows Hello.
    • Configure user account control.


    Module 2: Configuring Data Access and Usage

    In this module, students will learn about permissions. This module will cover considerations for different files systems. Students will learn how to configure file and folder permissions as well as shared folders. The module will conclude with configuring settings through methods such as local and group policy.


    • Overview of File Systems
    • Configuring and Managing File Access
    • Configuring and Managing Shared Folders
    • Managing Security with Policies
    • Lab: Configuring and Managing Permissions and Shares
    • Creating, Managing, and Sharing a Folder
    • Using Conditions to Control Access and Effective Permissions

    After completing this module, students will be able to:

    • Describe the differences and benefits of supported file systems.
    • Configure file and folder permissions.
    • Configure shared folders.
    • Secure Windows through local policy settings.


    Module 3: Configuring Threat Protection

    This module introduces students to protecting devices from external threats. Students will learn about the different types of common threats. This module will teach students about using encryption, firewalls, and IPSec to help protect against threats. The module will conclude with how to configure and use Windows Defender and AppLocker.


    • Malware and Threat Protection
    • Windows Defender
    • Connection Security Rules
    • Advanced Protection Methods
    • Lab: Practice Lab: Managing Network Security
    • Creating and Testing Inbound Rules
    • Creating and Testing Outbound Rules
    • Creating and Testing Connection Security Rules
    • Configuring Windows Defender

    After completing this module, students will be able to:

    • Identify common security threats
    • Describe the methods by which you can mitigate these common security threats.
    • Describe the different methods of encryption.
    • Describe how Windows firewall can secure the device.
    • Describe the benefits of using IPSec.
    • Describe the different features of Windows Defender.
    • Describe the benefits of using AppLocker.


    Module 4: Course Conclusion

    • Final Exam
    • Lab: Graded Lab

    Target Audience

    Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.


    Before attending the Protecting Windows 10 (MD-100T03-A) course, learners have the following skills:

    • Basic understanding of computer networks and hardware concepts.
    • Basic understanding of OS and Application concepts.
    • Experience with using the Windows OS.