Login
Download
Skill UI
Browse and discover
9651+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Intune
, found
8
results
Default
Newest
Most Downloaded
Defender Advanced Protection Setup
configuring-windows-defender-advanced-settings
mukul975/Anthropic-Cybersecurity-Skills
447
Configures Microsoft Defender for Endpoint advanced protections (ASR, controlled folder access, network and exploit settings) through PowerShell or Intune/SCCM policies to harden Windows endpoints and meet compliance expectations.
View Details
Zero Trust Device Posture
implementing-device-posture-assessment-in-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
316
Implements zero trust device posture assessment by ingesting endpoint health signals from CrowdStrike ZTA, Microsoft Intune, and Jamf to enforce compliance via conditional access policies before granting access to resources.
View Details
BitLocker Disk Encryption
implementing-disk-encryption-with-bitlocker
mukul975/Anthropic-Cybersecurity-Skills
187
Implements full BitLocker disk encryption on Windows endpoints, covering TPM validation, GPO tuning, Intune deployment, recovery key escrow, and monitoring to help enterprises meet compliance and protect data at rest.
View Details
Endpoint Memory Hardening
implementing-memory-protection-with-dep-aslr
mukul975/Anthropic-Cybersecurity-Skills
436
Walks through enabling system and per-app DEP, ASLR, CFG, and related mitigations via ProcessMitigation cmdlets, exporting configs for Intune or GPO deployment, and noting compatibility pitfalls.
View Details
Enterprise Mobile App Management
implementing-mobile-application-management
mukul975/Anthropic-Cybersecurity-Skills
293
Implements Mobile Application Management controls like Intune App Protection Policies, selective wipe, app configuration, and DLP to protect corporate data on BYOD Android and iOS devices without full MDM, enforcing data separation and conditional access for enterprise apps.
View Details
Privileged Access Workstation Design
implementing-privileged-access-workstation
mukul975/Anthropic-Cybersecurity-Skills
88
Guides administrators through designing and implementing Privileged Access Workstations (PAWs) with hardened devices, just-in-time access, Intune/GPO compliance, and CyberArk or BeyondTrust integration for secure sensitive operations.
View Details
USB Device Control Policy
implementing-usb-device-control-policy
mukul975/Anthropic-Cybersecurity-Skills
276
Defines steps to inventory USB usage, configure GPO/Intune/EDR policies, deploy Microsoft Defender rules, and audit events to block unauthorized removable media while allowing approved devices, used for preventing data exfiltration via USB.
View Details
Endpoint Vulnerability Remediation
performing-endpoint-vulnerability-remediation
mukul975/Anthropic-Cybersecurity-Skills
89
Automates prioritizing CVEs by risk, orchestrating patch and configuration changes through WSUS/SCCM/Intune, handling zero-day mitigations, and validating fixes to keep endpoints compliant with SLAs.
View Details
1
Language
简体中文
English