Secure your organization with Microsoft Defender for Endpoint
- Offered byMicrosoft
Secure your organization with Microsoft Defender for Endpoint at Microsoft Overview
Duration | 2 hours |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Credential | Certificate |
Secure your organization with Microsoft Defender for Endpoint at Microsoft Course details
- Introduction to Microsoft Defender for Endpoint
- Evaluate endpoint security in Microsoft Defender for Endpoint
- Onboard to Microsoft Defender for Endpoint
- Strengthen your security posture with Microsoft Defender for Endpoint
- Reduce potential attack areas with Microsoft Defender for Endpoint
- Apply next-generation protection with Microsoft Defender for Endpoint
- Detect and respond to security issues using Microsoft Defender for Endpoint
- Use automated investigation and remediation in Microsoft Defender for Endpoint
- Gain insights through reporting in Microsoft Defender for Endpoint
- This learning path provides an overview of Microsoft Defender for Endpoint and how to use it as part of a cybersecurity solution. Microsoft Defender for Endpoint can help you prevent, detect, investigate, and respond to threats across your organization's endpoints - your devices and systems.Endpoint detection and response (EDR) capabilities provide advanced attack detections that are near real-time and actionable. When you implement EDR in your environment, your security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take action to remediate threats.The deadline for agencies to adopt government-wide EDR approaches based on OMB requirements, per section 7 of the Executive Order on Improving the Nation's Cybersecurity, is September 9, 2021.Microsoft Defender for Endpoint for US Government customers, built in the Azure US Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial and is based on the same prevention, detection, investigation, and remediation. However, there are some differences in the capabilities available for this offering. If you're using Microsoft Defender for Endpoint as part of your cybersecurity solution, per the Executive Order, be sure to review the differences as you build your plan.
Secure your organization with Microsoft Defender for Endpoint at Microsoft Curriculum
Introduction to Microsoft Defender for Endpoint
Introduction
Use Microsoft Defender for Endpoint
Access the portal
Knowledge check
Summary
Evaluate endpoint security in Microsoft Defender for Endpoint
Introduction
Set up the evaluation lab
Use the evaluation lab
Knowledge check
Summary
Onboard to Microsoft Defender for Endpoint
Introduction
Plan for Microsoft Defender for Endpoint
Prepare for Microsoft Defender for Endpoint
Onboard devices to Microsoft Defender for Endpoint
Knowledge check
Summary
Strengthen your security posture with Microsoft Defender for Endpoint
Introduction
Use threat and vulnerability management
Assess your security posture
Identify vulnerabilities on your devices
Improve your security posture and reduce risk
Knowledge check
Summary
Reduce potential attack areas with Microsoft Defender for Endpoint
Introduction
Minimize potential attack areas with attack surface reduction
Enable attack surface reduction rules
Knowledge check
Summary
Apply next-generation protection with Microsoft Defender for Endpoint
Introduction
Get intelligent protection with Microsoft Defender for Endpoint's next-generation protection
Use behavioral blocking and containment
Knowledge check
Summary
Detect and respond to security issues using Microsoft Defender for Endpoint
Introduction
Use the alerts and incidents queues
Take response actions
Knowledge check
Summary
Use automated investigation and remediation in Microsoft Defender for Endpoint
Introduction
Investigate and remediate threats through automated investigation and remediation
Set up automated investigation and remediation
Knowledge check
Summary
Gain insights through reporting in Microsoft Defender for Endpoint
Introduction
Use threat protection reports, vulnerability reports, and health reports
Track emerging threats with threat analytics
Use custom reports with Power BI
Knowledge check
Summary