Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Microsoft Defender for Endpoint

3/23/2022

0 Comments

 
Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Defender for Endpoint provides advanced threat protection that includes antivirus, antimalware, ransomware mitigation, and more, together with centralized management and reporting. Two plans are available:

  • Microsoft Defender for Endpoint Plan 1; and
  • Microsoft Defender for Endpoint Plan 2, formerly known as Microsoft Defender for Endpoint.
Microsoft Endpoint Manager (Intune portal) 





Microsoft Defender for Endpoint

TABLE 1
Threat & Vulnerability Management
Threat & Vulnerability Management
Attack surface reduction
Attack surface reduction
Next-generation protection
Next-generation protection
Endpoint detection and response
Endpoint detection and response
Automated investigation and remediation
Automated investigation and remediation
Microsoft Threat Experts
Microsoft Threat Experts
Centralized configuration and administration, APIs
Microsoft 365 Defender

Activate Microsoft Defender

Turn on Microsoft Defender Antivirus

Complete the following steps to turn on Microsoft Defender Antivirus on your device.

  1. Select the Start menu.
  2. In the search bar, type group policy. Then select Edit group policy from the listed results. The Local Group Policy Editor will open.
  3. Select Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus.
  4. Scroll to the bottom of the list and select Turn off Microsoft Defender Antivirus.
  5. Select Disabled or Not configured. It might feel counter-intuitive to select these options because the names suggest that you're turning Microsoft Defender Antivirus off. Don't worry, these options actually ensure that it's turned on.
  6. Select Apply > OK.

Turn on real-time and cloud-delivered protection

Complete the following steps to turn on real-time and cloud-delivered protection. Together, these antivirus features protect you against spyware and can deliver fixes for malware issues via the cloud.

  1. Select the Start menu.
  2. In the search bar, type Windows Security. Select the matching result.
  3. Select Virus & threat protection.
  4. Under Virus & threat protection settings, select Manage settings.
  5. Flip each switch under Real-time protection and Cloud-delivered protection to turn them on.

If you don't see these options on your screen, they may be hidden. Complete the following steps to make them visible.

  1. Select the Start menu.
  2. In the search bar, type group policy. Then select Edit group policy from the listed results. The Local Group Policy Editor will open.
  3. Select Computer Configuration > Administrative Templates > Windows Components > Windows Security > Virus and threat protection.
  4. Select Hide the Virus and threat protection area.
  5. Select Disabled > Apply > OK.

Onboarding tool options

The following table lists the available tools based on the endpoint that you need to onboard.

Endpoint Tool options
Windows Local script (up to 10 devices)
Group Policy
Microsoft Endpoint Manager/ Mobile Device Manager
Microsoft Endpoint Configuration Manager
VDI scripts
Integration with Microsoft Defender for Cloud
macOS Local scripts
Microsoft Endpoint Manager
JAMF Pro
Mobile Device Management
Linux Server Local script
Puppet
Ansible
iOS Microsoft Endpoint Manager
Android Microsoft Endpoint Manager

PowerShell Command for Troubleshooting




PS C:\Users\test1> get-MPcomputerstatus
AMEngineVersion                  : 1.1.18900.3
AMProductVersion                 : 4.18.2201.10
AMRunningMode                    : Normal
AMServiceEnabled                 : True
AMServiceVersion                 : 4.18.2201.10
AntispywareEnabled               : True
AntispywareSignatureAge          : 0
AntispywareSignatureLastUpdated  : 03/04/2022 8:59:39 AM
AntispywareSignatureVersion      : 1.359.1366.0
AntivirusEnabled                 : True
AntivirusSignatureAge            : 0
AntivirusSignatureLastUpdated    : 03/04/2022 8:59:38 AM
AntivirusSignatureVersion        : 1.359.1366.0
BehaviorMonitorEnabled           : True
ComputerID                       : 580F14A1-4405-EEA6-2C71-96B3EA0C42C6
ComputerState                    : 0
DeviceControlDefaultEnforcement  : N/A
DeviceControlPoliciesLastUpdated : 03/04/2022 2:04:19 PM
DeviceControlState               : N/A
FullScanAge                      : 0
FullScanEndTime                  : 03/04/2022 1:48:27 PM
FullScanStartTime                : 03/04/2022 1:10:43 PM
IoavProtectionEnabled            : True
IsTamperProtected                : False
IsVirtualMachine                 : False
LastFullScanSource               : 2
LastQuickScanSource              : 2
NISEnabled                       : True
NISEngineVersion                 : 1.1.18900.3
NISSignatureAge                  : 0
NISSignatureLastUpdated          : 03/04/2022 8:59:38 AM
NISSignatureVersion              : 1.359.1366.0
OnAccessProtectionEnabled        : True
QuickScanAge                     : 481
QuickScanEndTime                 : 11/07/2020 9:36:57 PM
QuickScanStartTime               : 11/07/2020 9:35:40 PM
RealTimeProtectionEnabled        : True
RealTimeScanDirection            : 0
TamperProtectionSource           : Service Init
TDTMode                          : cm
TDTStatus                        : Disabled
TDTTelemetry                     : Disabled
PSComputerName                   :
PS C:\Users\test1> get-mppreference
AllowDatagramProcessingOnWinServer            : False
AllowNetworkProtectionDownLevel               : False
AllowNetworkProtectionOnWinServer             : False
AllowSwitchToAsyncInspection                  : False
AttackSurfaceReductionOnlyExclusions          : {N/A: Must be and administrator to view exclusions}
AttackSurfaceReductionRules_Actions           :
AttackSurfaceReductionRules_Ids               :
CheckForSignaturesBeforeRunningScan           : True
CloudBlockLevel                               : 0
CloudExtendedTimeout                          : 50
ComputerID                                    : 580F14A1-4405-EEA6-2C71-96B3EA0C42C6
ControlledFolderAccessAllowedApplications     : {N/A: Must be and administrator to view exclusions}
ControlledFolderAccessProtectedFolders        :
DefinitionUpdatesChannel                      : 0
DisableArchiveScanning                        : False
DisableAutoExclusions                         : False
DisableBehaviorMonitoring                     : False
DisableBlockAtFirstSeen                       : False
DisableCatchupFullScan                        : True
DisableCatchupQuickScan                       : True
DisableCpuThrottleOnIdleScans                 : True
DisableDatagramProcessing                     : False
DisableDnsOverTcpParsing                      : False
DisableDnsParsing                             : False
DisableEmailScanning                          : True
DisableFtpParsing                             : False
DisableGradualRelease                         : False
DisableHttpParsing                            : False
DisableInboundConnectionFiltering             : False
DisableIOAVProtection                         : False
DisableNetworkProtectionPerfTelemetry         : False
DisablePrivacyMode                            : False
DisableRdpParsing                             : False
DisableRealtimeMonitoring                     : False
DisableRemovableDriveScanning                 : False
DisableRestorePoint                           : True
DisableScanningMappedNetworkDrivesForFullScan : True
DisableScanningNetworkFiles                   : False
DisableScriptScanning                         : False
DisableSshParsing                             : False
DisableTlsParsing                             : False
EnableControlledFolderAccess                  : 0
EnableDnsSinkhole                             : True
EnableFileHashComputation                     : False
EnableFullScanOnBatteryPower                  : False
EnableLowCpuPriority                          : False
EnableNetworkProtection                       : 0
EngineUpdatesChannel                          : 0
ExclusionExtension                            : {N/A: Must be and administrator to view exclusions}
ExclusionIpAddress                            : {N/A: Must be and administrator to view exclusions}
ExclusionPath                                 : {N/A: Must be and administrator to view exclusions}
ExclusionProcess                              : {N/A: Must be and administrator to view exclusions}
ForceUseProxyOnly                             : False
HighThreatDefaultAction                       : 0
LowThreatDefaultAction                        : 0
MAPSReporting                                 : 1
MeteredConnectionUpdates                      : False
ModerateThreatDefaultAction                   : 0
PlatformUpdatesChannel                        : 0
ProxyBypass                                   :
ProxyPacUrl                                   :
ProxyServer                                   :
PUAProtection                                 : 0
QuarantinePurgeItemsAfterDelay                : 90
RandomizeScheduleTaskTimes                    : True
RealTimeScanDirection                         : 0
RemediationScheduleDay                        : 0
RemediationScheduleTime                       : 12:30:00
ReportingAdditionalActionTimeOut              : 10080
ReportingCriticalFailureTimeOut               : 10080
ReportingNonCriticalTimeOut                   : 1440
ScanAvgCPULoadFactor                          : 50
ScanOnlyIfIdleEnabled                         : True
ScanParameters                                : 2
ScanPurgeItemsAfterDelay                      : 15
ScanScheduleDay                               : 0
ScanScheduleOffset                            : 750
ScanScheduleQuickScanTime                     : 00:00:00
ScanScheduleTime                              : 12:30:00
SchedulerRandomizationTime                    : 4
ServiceHealthReportInterval                   : 60
SevereThreatDefaultAction                     : 0
SharedSignaturesPath                          :
SignatureAuGracePeriod                        : 0
SignatureBlobFileSharesSources                :
SignatureBlobUpdateInterval                   : 60
SignatureDefinitionUpdateFileSharesSources    :
SignatureDisableUpdateOnStartupWithoutEngine  : False
SignatureFallbackOrder                        : MicrosoftUpdateServer
SignatureFirstAuGracePeriod                   : 120
SignatureScheduleDay                          : 0
SignatureScheduleTime                         : 00:15:00
SignatureUpdateCatchupInterval                : 1
SignatureUpdateInterval                       : 1
SubmitSamplesConsent                          : 1
ThreatIDDefaultAction_Actions                 :
ThreatIDDefaultAction_Ids                     :
ThrottleForScheduledScanOnly                  : True
TrustLabelProtectionStatus                    : 0
UILockdown                                    : False
UnknownThreatDefaultAction                    : 0
PSComputerName                                :




Update-MpSignature -UpdateSource InternalDefinitionUpdateServer






PS C:\Program Files\Windows Defender> .\MpCmdRun.exe -SignatureUpdate
Signature update started . . .
Signature update finished.
PS C:\Program Files\Windows Defender>






PS C:\Program Files\Windows Defender> .\MpCmdRun.exe -removeDefinitions
You need administrator privilege to execute this command.





PS C:\Program Files\Windows Defender> .\MpCmdRun.exe -removeDefinitions
You need administrator privilege to execute this command.




PS C:\Program Files\Windows Defender> .\MpCmdRun.exe -removeDefinitions
You need administrator privilege to execute this command.






PS C:\windows\System32> Get-MpPreference

AllowDatagramProcessingOnWinServer            : False
AllowNetworkProtectionDownLevel               : False
AllowNetworkProtectionOnWinServer             : False
AllowSwitchToAsyncInspection                  : False
AttackSurfaceReductionOnlyExclusions          : {N/A: Must be and administrator to view exclusions}
AttackSurfaceReductionRules_Actions           :
AttackSurfaceReductionRules_Ids               :
CheckForSignaturesBeforeRunningScan           : True
CloudBlockLevel                               : 0
CloudExtendedTimeout                          : 50
ComputerID                                    : 580F14A1-4405-EEA6-2C71-96B3EA0C42C6
ControlledFolderAccessAllowedApplications     : {N/A: Must be and administrator to view exclusions}
ControlledFolderAccessProtectedFolders        :
DefinitionUpdatesChannel                      : 0
DisableArchiveScanning                        : False
DisableAutoExclusions                         : False
DisableBehaviorMonitoring                     : False
DisableBlockAtFirstSeen                       : False
DisableCatchupFullScan                        : True
DisableCatchupQuickScan                       : True
DisableCpuThrottleOnIdleScans                 : True
DisableDatagramProcessing                     : False
DisableDnsOverTcpParsing                      : False
DisableDnsParsing                             : False
DisableEmailScanning                          : True
DisableFtpParsing                             : False
DisableGradualRelease                         : False
DisableHttpParsing                            : False
DisableInboundConnectionFiltering             : False
DisableIOAVProtection                         : False
DisableNetworkProtectionPerfTelemetry         : False
DisablePrivacyMode                            : False
DisableRdpParsing                             : False
DisableRealtimeMonitoring                     : False
DisableRemovableDriveScanning                 : False
DisableRestorePoint                           : True
DisableScanningMappedNetworkDrivesForFullScan : True
DisableScanningNetworkFiles                   : False
DisableScriptScanning                         : False
DisableSshParsing                             : False
DisableTlsParsing                             : False
EnableControlledFolderAccess                  : 0
EnableDnsSinkhole                             : True
EnableFileHashComputation                     : False
EnableFullScanOnBatteryPower                  : False
EnableLowCpuPriority                          : False
EnableNetworkProtection                       : 0
EngineUpdatesChannel                          : 0
ExclusionExtension                            : {N/A: Must be and administrator to view exclusions}
ExclusionIpAddress                            : {N/A: Must be and administrator to view exclusions}
ExclusionPath                                 : {N/A: Must be and administrator to view exclusions}
ExclusionProcess                              : {N/A: Must be and administrator to view exclusions}
ForceUseProxyOnly                             : False
HighThreatDefaultAction                       : 0
LowThreatDefaultAction                        : 0
MAPSReporting                                 : 1
MeteredConnectionUpdates                      : False
ModerateThreatDefaultAction                   : 0
PlatformUpdatesChannel                        : 0
ProxyBypass                                   :
ProxyPacUrl                                   :
ProxyServer                                   : 142.106.63.41:8080
PUAProtection                                 : 0
QuarantinePurgeItemsAfterDelay                : 90
RandomizeScheduleTaskTimes                    : True
RealTimeScanDirection                         : 0
RemediationScheduleDay                        : 0
RemediationScheduleTime                       : 12:30:00
ReportingAdditionalActionTimeOut              : 10080
ReportingCriticalFailureTimeOut               : 10080
ReportingNonCriticalTimeOut                   : 1440
ScanAvgCPULoadFactor                          : 50
ScanOnlyIfIdleEnabled                         : True
ScanParameters                                : 2
ScanPurgeItemsAfterDelay                      : 15
ScanScheduleDay                               : 0
ScanScheduleOffset                            : 750
ScanScheduleQuickScanTime                     : 00:00:00
ScanScheduleTime                              : 12:30:00
SchedulerRandomizationTime                    : 4
ServiceHealthReportInterval                   : 60
SevereThreatDefaultAction                     : 0
SharedSignaturesPath                          :
SignatureAuGracePeriod                        : 0
SignatureBlobFileSharesSources                :
SignatureBlobUpdateInterval                   : 60
SignatureDefinitionUpdateFileSharesSources    :
SignatureDisableUpdateOnStartupWithoutEngine  : False
SignatureFallbackOrder                        : MicrosoftUpdateServer
SignatureFirstAuGracePeriod                   : 120
SignatureScheduleDay                          : 0
SignatureScheduleTime                         : 00:15:00
SignatureUpdateCatchupInterval                : 1
SignatureUpdateInterval                       : 1
SubmitSamplesConsent                          : 1
ThreatIDDefaultAction_Actions                 :
ThreatIDDefaultAction_Ids                     :
ThrottleForScheduledScanOnly                  : True
TrustLabelProtectionStatus                    : 0
UILockdown                                    : False
UnknownThreatDefaultAction                    : 0
PSComputerName                                :


PS C:\windows\System32>








Compare Defender for Endpoint plans

The following table describes what's included in each plan at a high level.

COMPARE DEFENDER FOR ENDPOINT PLANS
Defender for Endpoint Plan 1 Defender for Endpoint Plan 2
Next-generation protection
(includes antimalware and antivirus)

Attack surface reduction

Manual response actions

Centralized management

Security reports

APIs

Defender for Endpoint Plan 1, plus:

Device discovery

Threat and vulnerability management

Threat Analytics

Automated investigation and response

Advanced hunting

Endpoint detection and response

Microsoft Threat Experts

Support for Windows 10, iOS, Android OS, and macOS devices Support for Windows (client and server) and non-Windows platforms
(macOS, iOS, Android, and Linux)
To try Defender for Endpoint Plan 1, visit https://aka.ms/mdep1trial. To try Defender for Endpoint Plan 2, visit https://aka.ms/MDEp2OpenTrial.


Defender for Endpoint Plan 1 diagram




Define Defender Policies in Endpoint Manager (Intune)

Go to Microsoft Endpoint Manager Admin Center - Endpoint Security - Manage

Manage
  • Antivirus
  • Disk encryption
  • Firewall
  • Endpoint detection and response
  • Attack surface reduction
  • Account protection
  • Device compliance
  • Conditional access



Create Notification Rules


Go to Microsoft 365 Defender - Settings - Endpoints


Click Email notifications - Alerts - Add items
Create a notification rule for high severity alert

Also you can create a notification rule for critical/high vulnerability event:






Reports




Take response actions


On a device

  • Response actions on devices
  • Manage tags
  • Start an automated investigation
  • Start a Live Response session
  • Collect investigation package
  • Run antivirus scan
  • Restrict app execution
  • Isolate devices from the network
  • Consult a threat expert
  • Check activity details in Action center


On a file

  • Response actions on files
  • Stop and quarantine files in your network
  • Restore file from quarantine
  • Add indicators to block or allow a file
  • Consult a threat expert
  • Check activity details in Action center
  • Download or collect file
  • Deep analysis



Training

Train your security staff for Microsoft 365 Defender


Become a Microsoft 365 Defender Ninja


Security Operations Fundamentals

Module 1. Technical overview

  • thumbnail image 8 of blog post titled Become a Microsoft 365 Defender Ninja Short overview “What is Microsoft 365 Defender"
  • thumbnail image 9 of blog post titled Become a Microsoft 365 Defender Ninja Unified experiences across endpoint and email
  • thumbnail image 10 of blog post titled Become a Microsoft 365 Defender Ninja New value for ​Defender for Identity
  • thumbnail image 11 of blog post titled Become a Microsoft 365 Defender Ninja New value for Defender for Office 365
  • thumbnail image 12 of blog post titled Become a Microsoft 365 Defender Ninja XDR announcement blog

Module 2. Getting started

  • thumbnail image 13 of blog post titled Become a Microsoft 365 Defender Ninja Quick tutorial to get you started
  • thumbnail image 14 of blog post titled Become a Microsoft 365 Defender Ninja Starting the service
  • thumbnail image 15 of blog post titled Become a Microsoft 365 Defender Ninja Prepare your Azure Active Directory
  • thumbnail image 16 of blog post titled Become a Microsoft 365 Defender Ninja Manage access
  • thumbnail image 17 of blog post titled Become a Microsoft 365 Defender Ninja Provide your feedback

Module 3. Investigation – Incident

  • thumbnail image 18 of blog post titled Become a Microsoft 365 Defender Ninja Work with incidents
  • thumbnail image 19 of blog post titled Become a Microsoft 365 Defender Ninja Get email notifications on new incidents
  • thumbnail image 20 of blog post titled Become a Microsoft 365 Defender Ninja Improved incident queue
  • thumbnail image 21 of blog post titled Become a Microsoft 365 Defender Ninja Classification of incidents & alerts
  • thumbnail image 22 of blog post titled Become a Microsoft 365 Defender Ninja See how consolidated incidents improve SOC efficiency
  • thumbnail image 23 of blog post titled Become a Microsoft 365 Defender Ninja Protect your organization with Microsoft 365 Defender
  • thumbnail image 24 of blog post titled Become a Microsoft 365 Defender Ninja Incidents trend graph view
  • thumbnail image 25 of blog post titled Become a Microsoft 365 Defender Ninja Responding to my first incident, a tutorial and walkthrough for new-to-role analysts

  • thumbnail image 26 of blog post titled Become a Microsoft 365 Defender Ninja Alert page for incident detections  

  • thumbnail image 27 of blog post titled Become a Microsoft 365 Defender Ninja Email Entity page

Module 4. Threat Analytics

  • thumbnail image 28 of blog post titled Become a Microsoft 365 Defender Ninja Threat analytics
  • thumbnail image 29 of blog post titled Become a Microsoft 365 Defender Ninja Overview of Threat Analytics

Module 5. Advanced hunting

  • thumbnail image 30 of blog post titled Become a Microsoft 365 Defender Ninja Quick overview & a short tutorial that will get you started fast
  • thumbnail image 31 of blog post titled Become a Microsoft 365 Defender Ninja Learn the query language
  • thumbnail image 32 of blog post titled Become a Microsoft 365 Defender Ninja Understand the schema

Module 6. Self-healing

  • thumbnail image 33 of blog post titled Become a Microsoft 365 Defender Ninja How automation works
  • thumbnail image 34 of blog post titled Become a Microsoft 365 Defender Ninja Learn about the various AIR capabilities
  • thumbnail image 35 of blog post titled Become a Microsoft 365 Defender Ninja The action center

Module 7. Community (blogs, webinars, GitHub)

  • thumbnail image 36 of blog post titled Become a Microsoft 365 Defender Ninja Microsoft Threat Protection Blog
  • thumbnail image 37 of blog post titled Become a Microsoft 365 Defender Ninja Tech Community

Module 8. Partner

  • thumbnail image 38 of blog post titled Become a Microsoft 365 Defender Ninja Professional security services catalog 

 

> Ready for the Fundamentals Knowledge Check? 

 

Security Operations Intermediate

Module 1.  Architecture

  • thumbnail image 39 of blog post titled Become a Microsoft 365 Defender Ninja Microsoft Threat Protection data security and privacy

Module 2. Investigation

  • thumbnail image 40 of blog post titled Become a Microsoft 365 Defender Ninja Correlating and consolidating attacks into incidents
  • thumbnail image 41 of blog post titled Become a Microsoft 365 Defender Ninja Investigate incidents
  • thumbnail image 42 of blog post titled Become a Microsoft 365 Defender Ninja Mapping attack chains from cloud to endpoint
  • thumbnail image 43 of blog post titled Become a Microsoft 365 Defender Ninja Prioritize incidents
  • thumbnail image 44 of blog post titled Become a Microsoft 365 Defender Ninja Manage incidents
  • thumbnail image 45 of blog post titled Become a Microsoft 365 Defender Ninja Investigation improvements for Microsoft Defender for Office 365
  • thumbnail image 46 of blog post titled Become a Microsoft 365 Defender Ninja Report false positives/negatives

Module 3. Advanced hunting

  • thumbnail image 47 of blog post titled Become a Microsoft 365 Defender Ninja Advanced hunting cheat sheet
  • thumbnail image 48 of blog post titled Become a Microsoft 365 Defender Ninja Microsoft Cloud App Security: The Hunt in a multi-stage incident
  • thumbnail image 49 of blog post titled Become a Microsoft 365 Defender Ninja Hunting with Microsoft Cloud App Security data
  • thumbnail image 50 of blog post titled Become a Microsoft 365 Defender Ninja Microsoft Cloud App Security: The Hunt for Insider Risk
  • thumbnail image 51 of blog post titled Become a Microsoft 365 Defender Ninja Limitless Advanced Hunting with Azure Data Explorer (ADX)
  • thumbnail image 52 of blog post titled Become a Microsoft 365 Defender Ninja Take action on advanced hunting query results
  • thumbnail image 53 of blog post titled Become a Microsoft 365 Defender Ninja Advanced Hunting in portal Schema Reference 
  • thumbnail image 54 of blog post titled Become a Microsoft 365 Defender Ninja DeviceFromIP() function in advanced hunting
  • thumbnail image 55 of blog post titled Become a Microsoft 365 Defender Ninja Webinar series, episode 1: KQL fundamentals (MP4, YouTube)
  • thumbnail image 56 of blog post titled Become a Microsoft 365 Defender Ninja Advanced hunting query best practices
  • thumbnail image 57 of blog post titled Become a Microsoft 365 Defender Ninja Hunt across cloud app activities
  • thumbnail image 58 of blog post titled Become a Microsoft 365 Defender Ninja Use additional email data in your hunting queries
  • thumbnail image 59 of blog post titled Become a Microsoft 365 Defender Ninja Use Azure Active Directory audit log data in advanced hunting
  • thumbnail image 60 of blog post titled Become a Microsoft 365 Defender Ninja Hunt for Azure Active Directory sign-in events
  • thumbnail image 61 of blog post titled Become a Microsoft 365 Defender Ninja Advanced hunting queries on GitHub

Module 4. Automated investigation and remediation

  • thumbnail image 62 of blog post titled Become a Microsoft 365 Defender Ninja Remediation actions following automated investigations
  • thumbnail image 63 of blog post titled Become a Microsoft 365 Defender Ninja Approve or reject pending actions

Module 6. Self-healing

  • thumbnail image 64 of blog post titled Become a Microsoft 365 Defender Ninja Learn about the various AIR capabilities
  • thumbnail image 65 of blog post titled Become a Microsoft 365 Defender Ninja Self-healing explained based on an example 
  • thumbnail image 66 of blog post titled Become a Microsoft 365 Defender Ninja Configure automated investigation and response capabilities
  • thumbnail image 67 of blog post titled Become a Microsoft 365 Defender Ninja Approve or reject pending actions
  • thumbnail image 68 of blog post titled Become a Microsoft 365 Defender Ninja Report a false positive/negative to Microsoft for analysis
  • thumbnail image 69 of blog post titled Become a Microsoft 365 Defender Ninja The action center

Module 5. Build your own lab

  • thumbnail image 70 of blog post titled Become a Microsoft 365 Defender Ninja Create a lab environment

Module 7. Reporting

  • thumbnail image 71 of blog post titled Become a Microsoft 365 Defender Ninja Out of the box reports

Module 8. Microsoft Threat Experts

  • thumbnail image 72 of blog post titled Become a Microsoft 365 Defender Ninja Microsoft Threat Experts

 

> Ready for the Intermediate Knowledge Check? 

 

Security Operations Expert

Module 1. Incidents

  • thumbnail image 73 of blog post titled Become a Microsoft 365 Defender Ninja Prioritize incidents
  • thumbnail image 74 of blog post titled Become a Microsoft 365 Defender Ninja Manage incidents
  • thumbnail image 75 of blog post titled Become a Microsoft 365 Defender Ninja Report false positives/negatives
  • thumbnail image 76 of blog post titled Become a Microsoft 365 Defender Ninja Deep-dive attack playbooks from the DART team for seasoned analysts
  • thumbnail image 77 of blog post titled Become a Microsoft 365 Defender Ninja Incident response overview

Module 2. Advanced hunting

  •  thumbnail image 78 of blog post titled Become a Microsoft 365 Defender Ninja Webinar series, episode 2: Joins (MP4, YouTube)
  •  thumbnail image 79 of blog post titled Become a Microsoft 365 Defender Ninja Webinar series, episode 3: Summarizing, pivoting, and visualizing Data (MP4, YouTube)
  •  thumbnail image 80 of blog post titled Become a Microsoft 365 Defender Ninja Webinar series, episode 4: Let’s hunt! Applying KQL to incident tracking (MP4, YouTube)
  • ⤴ Plural sight KQL training

Module 3. APIs, custom reports, SIEM & other integrations

  • thumbnail image 81 of blog post titled Become a Microsoft 365 Defender Ninja Microsoft 365 Defender APIs
  • thumbnail image 82 of blog post titled Become a Microsoft 365 Defender Ninja Best practices for leveraging API's - Episode Two
  • thumbnail image 83 of blog post titled Become a Microsoft 365 Defender Ninja Streaming API Announcement blog
  • thumbnail image 84 of blog post titled Become a Microsoft 365 Defender Ninja Overview of the Streaming API
  • thumbnail image 85 of blog post titled Become a Microsoft 365 Defender Ninja Stream Microsoft 365 Defender events
  • thumbnail image 86 of blog post titled Become a Microsoft 365 Defender Ninja Azure Sentinel and Microsoft 365 Defender incident integration
  • thumbnail image 87 of blog post titled Become a Microsoft 365 Defender Ninja Overview Azure Sentinel integration
  • thumbnail image 88 of blog post titled Become a Microsoft 365 Defender Ninja Azure Sentinel integration

 

> Ready for the Expert Knowledge Check? 




Microsoft Learn learning paths

Use these Microsoft Learn learning paths and their modules to build an understanding of Microsoft 365 Defender and Microsoft Defender for Endpoint, one module and unit at a time.

  • Detect and respond to cyber attacks with Microsoft 365 Defender

  • Secure your organization with Microsoft Defender for Endpoint


References

  • Microsoft Defender for Endpoint Plan 1 and Plan 2
  • Portal for Microsoft 365 Defender
  • Microsoft Defender for Endpoint documentation
  • Defender-specific functions
  • Defender Proxy Settings



via Blogger http://blog.51sec.org/2022/03/microsoft-defender-for-endpoint.html
March 23, 2022 at 01:47PM Security
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org