top of page
kat2-073442.jpg

Virtual Workshops

Our hands-on workshops not only teach Microsoft's security and management tools but also ensure participants leave with a fully implemented solution they can immediately use and expand upon, with each session ending in an operational setup.

KT_Security Workshop_v3_05-26-24.jpg

Workshop Objective

Participants will deploy and configure a comprehensive security solution using Microsoft Defender's suite. By the end of the workshop, each participant will have a live, fully functional security setup tailored to their environment, providing real-time threat protection and analysis.

 

Hands-On Activities

  • Deploying Microsoft Defender for Endpoint across selected devices.

  • Configuring Defender for Office 365 for email and collaboration tool protection.

  • Setting up Defender for Identity and Defender for Cloud Apps for comprehensive identity and application security.

  • Implementing automated response actions for identified threats.

  • Integrating Microsoft Defender with existing security tools for a unified defense strategy.

KT_Endpoint Workshop_v3_05-26-24.jpg

Workshop Objective

This workshop aims to set up a fully operational endpoint management system using Microsoft Intune. Participants will conclude the workshop with Intune effectively managing and securing their organization's devices and applications.

​

Hands-On Activities

  • Enrolling a variety of devices into Microsoft Intune management.

  • Creating and applying device compliance policies to ensure security and data protection.

  • Managing and deploying applications, including setting up app protection policies.

  • Configuring Conditional Access policies to safeguard resources while ensuring user productivity.

KT_Identity Workshop_v3_05-26-24.jpg

Workshop Objective

The focus of this workshop is to implement a fully functional identity and access management solution using Microsoft Entra. Participants will have an operational setup by the end that ensures secure and efficient access management within their organizations.

​

Hands-On Activities

  • Setting up Multi-Factor Authentication (MFA) for all users.

  • Implementing Conditional Access policies to control access based on various conditions.

  • Managing user roles and permissions to ensure least privilege access.

  • Utilizing Microsoft Entra’s Identity Protection features to detect and mitigate identity-based threats.

Workshop Presenter

Screen Shot 2024-01-17 at 10.10_edited.jpg

Josh Krodel

Sr. Solutions Engineer

​

Josh Krodel has over 25 years of expertise in Microsoft technologies, specializing in directory services, device management, and infrastructure both on-premises and in the cloud. He has earned numerous certifications, including his MCSE, and passed multiple fundamental exams across the Microsoft stack. As a Microsoft Certified Trainer (MCT), Josh is committed to continuous learning and sharing knowledge. He currently serves as a Senior Solutions Architect.

KT_BlueDotPattern-Wide-Right.png

Who is Katalyst?

From addressing complex challenges to embracing exciting opportunities, clients trust our team’s experience and expertise across cybersecurity, modern infrastructure, and cloud computing.

​

Though this technology is often complex, our philosophy isn’t: stay curious about the customer, approach work with humility, and work tirelessly to help customers achieve the best outcomes.
 

Partnering with Katalyst means you have a team of gritty, curious, and highly capable consultants. We work closely with you to understand your needs and objectives, then create a tailored solution to execute on your vision. Our collaborative approach means we're not satisfied until you are, and we stake our reputation on that. 
 

If you're looking for a true partner to help expand your technological capabilities, look no further. Take your next step forward with advice you can trust and a tailored solution from our comprehensive suite of on-demand and ongoing IT services.

KT_Newsletter-Clutch.png

Additional Resources

KT_CTABar.png

Ready to sign up for a virtual workshop?

bottom of page