Virtual Workshops
Our hands-on workshops not only teach Microsoft's security and management tools but also ensure participants leave with a fully implemented solution they can immediately use and expand upon, with each session ending in an operational setup.
Workshop Objective
Participants will deploy and configure a comprehensive security solution using Microsoft Defender's suite. By the end of the workshop, each participant will have a live, fully functional security setup tailored to their environment, providing real-time threat protection and analysis.
Hands-On Activities
-
Deploying Microsoft Defender for Endpoint across selected devices.
-
Configuring Defender for Office 365 for email and collaboration tool protection.
-
Setting up Defender for Identity and Defender for Cloud Apps for comprehensive identity and application security.
-
Implementing automated response actions for identified threats.
-
Integrating Microsoft Defender with existing security tools for a unified defense strategy.
Workshop Objective
This workshop aims to set up a fully operational endpoint management system using Microsoft Intune. Participants will conclude the workshop with Intune effectively managing and securing their organization's devices and applications.
​
Hands-On Activities
-
Enrolling a variety of devices into Microsoft Intune management.
-
Creating and applying device compliance policies to ensure security and data protection.
-
Managing and deploying applications, including setting up app protection policies.
-
Configuring Conditional Access policies to safeguard resources while ensuring user productivity.
Workshop Objective
The focus of this workshop is to implement a fully functional identity and access management solution using Microsoft Entra. Participants will have an operational setup by the end that ensures secure and efficient access management within their organizations.
​
Hands-On Activities
-
Setting up Multi-Factor Authentication (MFA) for all users.
-
Implementing Conditional Access policies to control access based on various conditions.
-
Managing user roles and permissions to ensure least privilege access.
-
Utilizing Microsoft Entra’s Identity Protection features to detect and mitigate identity-based threats.
Workshop Presenter
Josh Krodel
Sr. Solutions Engineer
​
Josh Krodel has over 25 years of expertise in Microsoft technologies, specializing in directory services, device management, and infrastructure both on-premises and in the cloud. He has earned numerous certifications, including his MCSE, and passed multiple fundamental exams across the Microsoft stack. As a Microsoft Certified Trainer (MCT), Josh is committed to continuous learning and sharing knowledge. He currently serves as a Senior Solutions Architect.
Who is Katalyst?
From addressing complex challenges to embracing exciting opportunities, clients trust our team’s experience and expertise across cybersecurity, modern infrastructure, and cloud computing.
​
Though this technology is often complex, our philosophy isn’t: stay curious about the customer, approach work with humility, and work tirelessly to help customers achieve the best outcomes.
Partnering with Katalyst means you have a team of gritty, curious, and highly capable consultants. We work closely with you to understand your needs and objectives, then create a tailored solution to execute on your vision. Our collaborative approach means we're not satisfied until you are, and we stake our reputation on that.
If you're looking for a true partner to help expand your technological capabilities, look no further. Take your next step forward with advice you can trust and a tailored solution from our comprehensive suite of on-demand and ongoing IT services.