SC-200: Mitigate threats using Microsoft Defender for Endpoint
- Offered byMicrosoft
SC-200: Mitigate threats using Microsoft Defender for Endpoint at Microsoft Overview
Duration | 6 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
SC-200: Mitigate threats using Microsoft Defender for Endpoint at Microsoft Course details
- Learn about Attack Surface Reduction (ASR) with Microsoft Defender for Endpoint
- Learn about information available to you through Microsoft Defender for Endpoint that will aid in your investigations
- Learn how Microsoft Defender for Endpoint provides the remote capability to contain devices and collect forensics data
- Learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings
- Learn how to configure settings to manage alerts and notifications
- Learn about your environment's weaknesses by using Vulnerability Management in Microsoft Defender for Endpoint
- Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats
- Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security
- Microsoft Defender for Endpoint gives you various tools to eliminate risks by reducing the surface area for attacks without blocking user productivity
- Microsoft Defender for Endpoint provides detailed device information, including forensics information
SC-200: Mitigate threats using Microsoft Defender for Endpoint at Microsoft Curriculum
Protect against threats with Microsoft Defender for Endpoint
Introduction to Microsoft Defender for Endpoint
Practice security administration
Hunt threats within your network
Summary and knowledge check
Deploy the Microsoft Defender for Endpoint environment
Introduction
Create your environment
Understand operating systems compatibility and features
Onboard devices
Manage access
Create and manage roles for role-based access control
Configure device groups
Configure environment advanced features
Knowledge check
Summary and resources
Implement Windows security enhancements with Microsoft Defender for Endpoint
Introduction
Understand attack surface reduction
Enable attack surface reduction rules
Knowledge check
Summary and resources
Perform device investigations in Microsoft Defender for Endpoint
Introduction
Use the device inventory list
Investigate the device
Use behavioral blocking
Detect devices with device discovery
Knowledge check
Summary and resources
Perform actions on a device using Microsoft Defender for Endpoint
Introduction
Explain device actions
Run Microsoft Defender antivirus scan on devices
Collect investigation package from devices
Initiate live response session
Knowledge check
Summary and resources
Perform evidence and entities investigations using Microsoft Defender for Endpoint
Introduction
Investigate a file
Investigate a user account
Investigate an IP address
Investigate a domain
Knowledge check
Summary and resources
Configure and manage automation using Microsoft Defender for Endpoint
Introduction
Configure advanced features
Manage automation upload and folder settings
Configure automated investigation and remediation capabilities
Block at risk devices
Knowledge check
Summary and resources
Configure for alerts and detections in Microsoft Defender for Endpoint
Introduction
Configure advanced features
Configure alert notifications
Manage alert suppression
Manage indicators
Knowledge check
Summary and resources
Utilize Vulnerability Management in Microsoft Defender for Endpoint
Introduction
Understand vulnerability management
Explore vulnerabilities on your devices
Manage remediation
Knowledge check
Summary and resources