Microsoft
Microsoft Logo

SC-200: Mitigate threats using Microsoft Defender for Endpoint 

  • Offered byMicrosoft

SC-200: Mitigate threats using Microsoft Defender for Endpoint
 at 
Microsoft 
Overview

Learn how Microsoft Defender for Endpoint can help your organization stay secure.

Duration

6 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

SC-200: Mitigate threats using Microsoft Defender for Endpoint
 at 
Microsoft 
Course details

Skills you will learn
What are the course deliverables?
  • Learn about Attack Surface Reduction (ASR) with Microsoft Defender for Endpoint
  • Learn about information available to you through Microsoft Defender for Endpoint that will aid in your investigations
  • Learn how Microsoft Defender for Endpoint provides the remote capability to contain devices and collect forensics data
  • Learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings
  • Learn how to configure settings to manage alerts and notifications
  • Learn about your environment's weaknesses by using Vulnerability Management in Microsoft Defender for Endpoint
More about this course
  • Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats
  • Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security
  • Microsoft Defender for Endpoint gives you various tools to eliminate risks by reducing the surface area for attacks without blocking user productivity
  • Microsoft Defender for Endpoint provides detailed device information, including forensics information

SC-200: Mitigate threats using Microsoft Defender for Endpoint
 at 
Microsoft 
Curriculum

Protect against threats with Microsoft Defender for Endpoint

Introduction to Microsoft Defender for Endpoint

Practice security administration

Hunt threats within your network

Summary and knowledge check

Deploy the Microsoft Defender for Endpoint environment

Introduction

Create your environment

Understand operating systems compatibility and features

Onboard devices

Manage access

Create and manage roles for role-based access control

Configure device groups

Configure environment advanced features

Knowledge check

Summary and resources

Implement Windows security enhancements with Microsoft Defender for Endpoint

Introduction

Understand attack surface reduction

Enable attack surface reduction rules

Knowledge check

Summary and resources

Perform device investigations in Microsoft Defender for Endpoint

Introduction

Use the device inventory list

Investigate the device

Use behavioral blocking

Detect devices with device discovery

Knowledge check

Summary and resources

Perform actions on a device using Microsoft Defender for Endpoint

Introduction

Explain device actions

Run Microsoft Defender antivirus scan on devices

Collect investigation package from devices

Initiate live response session

Knowledge check

Summary and resources

Perform evidence and entities investigations using Microsoft Defender for Endpoint

Introduction

Investigate a file

Investigate a user account

Investigate an IP address

Investigate a domain

Knowledge check

Summary and resources

Configure and manage automation using Microsoft Defender for Endpoint

Introduction

Configure advanced features

Manage automation upload and folder settings

Configure automated investigation and remediation capabilities

Block at risk devices

Knowledge check

Summary and resources

Configure for alerts and detections in Microsoft Defender for Endpoint

Introduction

Configure advanced features

Configure alert notifications

Manage alert suppression

Manage indicators

Knowledge check

Summary and resources

Utilize Vulnerability Management in Microsoft Defender for Endpoint

Introduction

Understand vulnerability management

Explore vulnerabilities on your devices

Manage remediation

Knowledge check

Summary and resources

SC-200: Mitigate threats using Microsoft Defender for Endpoint
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
1 hours
Beginner
Free
4 hours
Intermediate
Free
5 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

SC-200: Mitigate threats using Microsoft Defender for Endpoint
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...