Mitigating incidents with Microsoft Defender
Learn how the Microsoft Defender portal provides a unified view of incidents across the Microsoft Defender product family.
- Introduction
- Using the Microsoft Defender portal
- Managing incidents
- Investigating incidents
- Managing and investigating alerts
- Managing automated investigations
- Using the Info Centre
- Exploring the advanced threat search
- Investigating Microsoft Entra login logs
- Understanding Microsoft security assessment
- Analysing the threat assessment
- Analysing reports
- Configuring the Microsoft Defender portal
- Knowledge assessment
- Summary and resources
Deploying Microsoft Defender for Endpoint Environment
Learn how to deploy the Microsoft Defender for Endpoint environment, including device onboarding and security configuration.
- Introduction
- Creating the environment
- Understanding operating system compatibility and features
- Integrating devices
- Managing access
- Creating and managing roles for role-based access control
- Configuring device groups
- Configuring advanced environment features
- Knowledge assessment
- Summary and resources
Configure alerts and detections in Microsoft Defender for Endpoint
Learn how to configure settings to manage alerts and notifications. You will also learn how to enable indicators as part of the detection process.
- Introduction
- Configuring advanced features
- Configuring alert notifications
- Managing the suppression of alerts
- Managing indicators
- Knowledge assessment
- Summary and resources
Configure and manage automation with Microsoft Defender for Endpoint
Learn how to configure automation in Microsoft Defender for Endpoint by managing environment settings.
- Introduction
- Configure advanced features
- Manage settings for automated uploads and folders
- Configure automated scanning and maintenance features
- Blocking on risk devices
- Knowledge assessment
- Summary and resources
Performing device investigations in Microsoft Defender for Endpoint
Microsoft Defender for Endpoint provides comprehensive device information, including forensic information. Learn more about the information available in Microsoft Defender for Endpoint to help you with investigations.
- Introduction
- Using the device inventory list
- Investigating the device
- Using behaviour-based blocking
- Recognising devices with device discovery
- Knowledge assessment
- Summary and resources
Lab exercises to protect against cyberthreats with Microsoft Defender XDR
In this module, you learned how to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint, and onboard devices. You also configured policies, mitigated threats and responded to incidents with Defender XDR.
- Introduction
- Configuring the Microsoft Defender XDR environment
- Deploying Microsoft Defender for Endpoint
- Mitigating attacks with Microsoft Defender for Endpoint
- Summary