From the course: Microsoft Security Operations Analyst Associate (SC-200) Exam Tips
Unlock the full course today
Join today to access over 23,100 courses taught by industry experts.
Using Microsoft Defender for Endpoint
From the course: Microsoft Security Operations Analyst Associate (SC-200) Exam Tips
Using Microsoft Defender for Endpoint
- [Narrator] Microsoft Defender for Endpoint is the next extended detection and response solution under Microsoft 365 Defender. Microsoft Defender for Endpoint at the core is used to prevent, detect, investigate and respond to threats that may be initiated on a company's endpoints. This includes devices that are managed through Azure AD or on-premises Active Directory and onboarded with Microsoft Endpoint Manager, or Intune, Microsoft Endpoint Configuration Manager, formerly System Center Configuration Manager, as well as through Active Directory group policies and scripts. Similar to Microsoft Defender for Office, Microsoft Defender for Endpoint utilizes Microsoft's global threat intelligence to provide the near real-time detections of advanced attacks with actions. These threat detections create alerts in the system for immediate investigation. Microsoft Defender for Endpoint also has the ability to recognize attacks…
Contents
-
-
-
Using the Microsoft 365 Defender portal3m 55s
-
(Locked)
Using Microsoft Defender for Office 3654m 9s
-
(Locked)
Using Microsoft Defender for Endpoint3m 56s
-
(Locked)
Entra ID Protection (formerly Azure AD Identity Protection) and Microsoft Defender for Identity2m 49s
-
(Locked)
Microsoft 365 Defender threat monitoring and management4m 27s
-
(Locked)
Demo: Microsoft 365 Defender3m 53s
-
-
-
-
-