Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft Defender for Endpoint in Depth
  • Table Of Contents Toc
Microsoft Defender for Endpoint in Depth

Microsoft Defender for Endpoint in Depth

By : Paul Huijbregts, Joe Anich, Justen Graves
5 (14)
close
close
Microsoft Defender for Endpoint in Depth

Microsoft Defender for Endpoint in Depth

5 (14)
By: Paul Huijbregts, Joe Anich, Justen Graves

Overview of this book

With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization. This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture. By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.
Table of Contents (16 chapters)
close
close
1
Part 1: Unpacking Microsoft Defender for Endpoint
6
Part 2: Operationalizing and Integrating the Products
10
Part 3: Operations and Troubleshooting

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

Action center, from device page 83

Action center, from files page

analysis 94

filename, observing 94

actions

reviewing 81

Active Directory Domain Services (AD DS) 114

Add-MpPreference 284

advanced features, portal configuration

allow or block file 154

authenticated telemetry 156

automated investigation 152

automatically resolve alerts 153

custom network indicators 154

device discovery 156

download quarantined files 156

EDR in block mode 153

endpoint attack notifications 157

live response 153

live response for Servers 153

live response unsigned script execution 153

Microsoft Defender for Cloud Apps 155

Microsoft Defender for Identity (MDI) 155

Microsoft Intune connection 156

Office 365 Threat Intelligence connection 155

...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Microsoft Defender for Endpoint in Depth
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon