Microsoft
Microsoft Logo

Secure your organization with Microsoft Defender for Endpoint 

  • Offered byMicrosoft

Secure your organization with Microsoft Defender for Endpoint
 at 
Microsoft 
Overview

Duration

2 hours

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Credential

Certificate

Details Icon

Secure your organization with Microsoft Defender for Endpoint
 at 
Microsoft 
Course details

What are the course deliverables?
  • Introduction to Microsoft Defender for Endpoint
  • Evaluate endpoint security in Microsoft Defender for Endpoint
  • Onboard to Microsoft Defender for Endpoint
  • Strengthen your security posture with Microsoft Defender for Endpoint
  • Reduce potential attack areas with Microsoft Defender for Endpoint
  • Apply next-generation protection with Microsoft Defender for Endpoint
  • Detect and respond to security issues using Microsoft Defender for Endpoint
  • Use automated investigation and remediation in Microsoft Defender for Endpoint
  • Gain insights through reporting in Microsoft Defender for Endpoint
More about this course
  • This learning path provides an overview of Microsoft Defender for Endpoint and how to use it as part of a cybersecurity solution. Microsoft Defender for Endpoint can help you prevent, detect, investigate, and respond to threats across your organization's endpoints - your devices and systems.Endpoint detection and response (EDR) capabilities provide advanced attack detections that are near real-time and actionable. When you implement EDR in your environment, your security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take action to remediate threats.The deadline for agencies to adopt government-wide EDR approaches based on OMB requirements, per section 7 of the Executive Order on Improving the Nation's Cybersecurity, is September 9, 2021.Microsoft Defender for Endpoint for US Government customers, built in the Azure US Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial and is based on the same prevention, detection, investigation, and remediation. However, there are some differences in the capabilities available for this offering. If you're using Microsoft Defender for Endpoint as part of your cybersecurity solution, per the Executive Order, be sure to review the differences as you build your plan.
Read more

Secure your organization with Microsoft Defender for Endpoint
 at 
Microsoft 
Curriculum

Introduction to Microsoft Defender for Endpoint

Introduction

Use Microsoft Defender for Endpoint

Access the portal

Knowledge check

Summary

Evaluate endpoint security in Microsoft Defender for Endpoint

Introduction

Set up the evaluation lab

Use the evaluation lab

Knowledge check

Summary

Onboard to Microsoft Defender for Endpoint

Introduction

Plan for Microsoft Defender for Endpoint

Prepare for Microsoft Defender for Endpoint

Onboard devices to Microsoft Defender for Endpoint

Knowledge check

Summary

Strengthen your security posture with Microsoft Defender for Endpoint

Introduction

Use threat and vulnerability management

Assess your security posture

Identify vulnerabilities on your devices

Improve your security posture and reduce risk

Knowledge check

Summary

Reduce potential attack areas with Microsoft Defender for Endpoint

Introduction

Minimize potential attack areas with attack surface reduction

Enable attack surface reduction rules

Knowledge check

Summary

Apply next-generation protection with Microsoft Defender for Endpoint

Introduction

Get intelligent protection with Microsoft Defender for Endpoint's next-generation protection

Use behavioral blocking and containment

Knowledge check

Summary

Detect and respond to security issues using Microsoft Defender for Endpoint

Introduction

Use the alerts and incidents queues

Take response actions

Knowledge check

Summary

Use automated investigation and remediation in Microsoft Defender for Endpoint

Introduction

Investigate and remediate threats through automated investigation and remediation

Set up automated investigation and remediation

Knowledge check

Summary

Gain insights through reporting in Microsoft Defender for Endpoint

Introduction

Use threat protection reports, vulnerability reports, and health reports

Track emerging threats with threat analytics

Use custom reports with Power BI

Knowledge check

Summary

Secure your organization with Microsoft Defender for Endpoint
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
4 hours
Intermediate
Free
5 hours
Beginner
Free
1 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

Secure your organization with Microsoft Defender for Endpoint
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...