-
Book Overview & Buying
-
Table Of Contents
Microsoft Defender for Endpoint in Depth
By :
Microsoft Defender for Endpoint in Depth
By:
Overview of this book
With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization.
This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture.
By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.
Table of Contents (16 chapters)
Preface
Part 1: Unpacking Microsoft Defender for Endpoint
Chapter 1: A Brief History of Microsoft Defender for Endpoint
Chapter 2: Exploring Next-Generation Protection
Chapter 3: Introduction to Attack Surface Reduction
Chapter 4: Understanding Endpoint Detection and Response
Part 2: Operationalizing and Integrating the Products
Chapter 5: Planning and Preparing for Deployment
Chapter 6: Considerations for Deployment and Configuration
Chapter 7: Managing and Maintaining the Security Posture
Part 3: Operations and Troubleshooting
Chapter 8: Establishing Security Operations
Chapter 9: Troubleshooting Common Issues
Chapter 10: Reference Guide, Tips, and Tricks
Index