Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft Defender for Endpoint in Depth
  • Table Of Contents Toc
Microsoft Defender for Endpoint in Depth

Microsoft Defender for Endpoint in Depth

By : Paul Huijbregts, Joe Anich, Justen Graves
5 (14)
close
close
Microsoft Defender for Endpoint in Depth

Microsoft Defender for Endpoint in Depth

5 (14)
By: Paul Huijbregts, Joe Anich, Justen Graves

Overview of this book

With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization. This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture. By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.
Table of Contents (16 chapters)
close
close
1
Part 1: Unpacking Microsoft Defender for Endpoint
6
Part 2: Operationalizing and Integrating the Products
10
Part 3: Operations and Troubleshooting

Planning and Preparing for Deployment

In this chapter, we’ll cover how to plan and prepare for your deployment of Microsoft Defender for Endpoint (MDE). Most organizations have some degree of project planning and management standardization. The goal here is not to supplant that at all, but rather to give broad, general guidance on how you might go about planning a deployment (with as many specific MDE considerations as possible, of course). Certainly, IT and security teams can vary greatly in scope and responsibilities, and there’s no plan that’s going to fit everyone’s needs. The idea is more to ensure that anyone at any level of understanding or responsibility could pick up this book and have everything they need to be successful. As you read through the chapter, don’t be afraid to discard the ideas that don’t fit your environment or level of expertise, absorb any new ideas, or mold the concepts to your needs. This chapter isn’t meant...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Microsoft Defender for Endpoint in Depth
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon