top of page
kat2-073442.jpg

Virtual Workshops

Our hands-on workshops not only teach Microsoft's security and management tools but also ensure participants leave with a fully implemented solution they can immediately use and expand upon, with each session ending in an operational setup.

KT_Security Workshop_v3_05-26-24.jpg

Workshop Objective

Participants will deploy and configure a comprehensive security solution using Microsoft Defender's suite. By the end of the workshop, each participant will have a live, fully functional security setup tailored to their environment, providing real-time threat protection and analysis.

 

Hands-On Activities

  • Deploying Microsoft Defender for Endpoint across selected devices.

  • Configuring Defender for Office 365 for email and collaboration tool protection.

  • Setting up Defender for Identity and Defender for Cloud Apps for comprehensive identity and application security.

  • Implementing automated response actions for identified threats.

  • Integrating Microsoft Defender with existing security tools for a unified defense strategy.

KT_Endpoint Workshop_v3_05-26-24.jpg

Workshop Objective

This workshop aims to set up a fully operational endpoint management system using Microsoft Intune. Participants will conclude the workshop with Intune effectively managing and securing their organization's devices and applications.

Hands-On Activities

  • Enrolling a variety of devices into Microsoft Intune management.

  • Creating and applying device compliance policies to ensure security and data protection.

  • Managing and deploying applications, including setting up app protection policies.

  • Configuring Conditional Access policies to safeguard resources while ensuring user productivity.

KT_Identity Workshop_v3_05-26-24.jpg

Workshop Objective

The focus of this workshop is to implement a fully functional identity and access management solution using Microsoft Entra. Participants will have an operational setup by the end that ensures secure and efficient access management within their organizations.

Hands-On Activities

  • Setting up Multi-Factor Authentication (MFA) for all users.

  • Implementing Conditional Access policies to control access based on various conditions.

  • Managing user roles and permissions to ensure least privilege access.

  • Utilizing Microsoft Entra’s Identity Protection features to detect and mitigate identity-based threats.

Workshop Presenter

Screen Shot 2024-01-17 at 10.10_edited.jpg

Josh Krodel

Sr. Solutions Engineer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

KT_BlueDotPattern-Wide-Right.png

Who is Katalyst?

From addressing complex challenges to embracing exciting opportunities, clients trust our team’s experience and expertise across cybersecurity, modern infrastructure, and cloud computing.

Though this technology is often complex, our philosophy isn’t: stay curious about the customer, approach work with humility, and work tirelessly to help customers achieve the best outcomes.
 

Partnering with Katalyst means you have a team of gritty, curious, and highly capable consultants. We work closely with you to understand your needs and objectives, then create a tailored solution to execute on your vision. Our collaborative approach means we're not satisfied until you are, and we stake our reputation on that. 
 

If you're looking for a true partner to help expand your technological capabilities, look no further. Take your next step forward with advice you can trust and a tailored solution from our comprehensive suite of on-demand and ongoing IT services.

KT_Newsletter-Clutch.png

Additional Resources

KT_CTABar.png

Ready to sign up for a virtual workshop?

bottom of page