Explain, demonstrate, and discuss how to leverage:
Threat & Vulnerability Management
Integration with Microsoft Defender for Cloud Apps (MDA) & Intune
Enrollment of Mac and Windows
Validate inventory and threat intelligence feeds
Configure cloud-enablement and block at first sight
Integrate with MDA and Microsoft Defender for Identity
Configure advanced hunting rules
Configure and demonstrate auto-remediation
Demonstrate remote removal of malware using Live Response feature
Through interaction during the design & deployment phase and post-configuration training, SecOps admins, SOC engineers, and help desk techs will have an understanding of the toolset to become self-sufficient
Admins trained on how to onboard and adjust and create policies
SOC trained on hunting & remediation
Help desk trained on troubleshooting anomalies and user concerns
Information protection can help your organization prevent, detect, and contain malware and other endpoint security issues. At the end of the engagement, you will have a working environment utilizing each of the capabilities covered during the engagement. This training and hands-on experience allows organizations to be self-sufficient with the toolset.
Learn More about eGroup | Enabling Technologies Microsoft Defender for Endpoint.
Want to know how maximize the capabilities of Microsoft Defender for Endpoint?