
Overview
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. In this workshop you will learn how to enable, configure and implement Microsoft Defender for Endpoint for its industry-leading optics and detection capabilities and its capabilities to manage Windows and non-Windows platform endpoints.
Modules
.png?lmsauth=af5bda4f7df46dc54bd5cf321596cb236b0b22c6)
Introduction to Microsoft Defender for Endpoint
In this Module you will be introduced to Zero Trust, Microsoft Defender for Endpoint core capabilities, security plans and supported capabilities by platforms.
.png?lmsauth=aae8313f4127320f7d2a7cd1fea7be09da46b838)
Planning and Deploying Microsoft Defender for Endpoint
In this Module you will learn about Identifying architecture, selecting deployment method, configuring capabilities, Deployment phases, Onboarding Overview and Managing MDE after initial setup.
.png?lmsauth=625522b71b7f22d10f2f863e205b6d721df24e58)
Onboarding and configuring Devices.
In this Module you will learn about Onboarding and configuring capabilities, Integration with Microsoft Defender for Cloud, detect threats, protect endpoints and MDE integration with Microsoft Sentinel
.png?lmsauth=d0643183508112db4a4107c983f387063b0cc0a1)
Post-training Skills Assessment
Take this assessment to validate your skills gathered from the self-paced online learning course completed in this course to mark your completion.
.png?lmsauth=8ff885eda6bf6db13f9629945a2be87d0820470b)
Course Completion Survey
Share your feedback with us regarding your experience!
.png?lmsauth=c80003ff9f5eb7b1ddca2630b39eadebdf62abde)
-
Self pacedStyle
-
Technical Project Ready with LabsTarget Audience
-
NoCertification Course
-
YesHands on Labs
Solution Areas
Security, Threat Protection