-
Book Overview & Buying
-
Table Of Contents
Microsoft Defender for Endpoint in Depth
By :
In this chapter, we will address which additional layers of defense can be applied to your endpoints for additional opportunities to prevent attacks from gaining a foothold. Elements of this layered defense include the prevention of certain user- or application-initiated actions but also blocking connections to bad destinations, including those in use by attackers that have already had some success gaining a level of control over a device. Since some of these additional controls can have an impact on the user experience, your business software, or other (security-related) tools, you may need to carefully consider which can be safely applied.
We will cover the following topics:
Cold snack
ASR features used to...
Change the font size
Change margin width
Change background colour