Explain, demonstrate, and discuss how to leverage:
EPP/EDR
Exploit Guard
Threat Hunting
Threat & Vulnerability Management
Integration with Microsoft Defender for Cloud Apps (MDA) & Intune
Deployment
Enrollment of Mac and Windows
Validate inventory and threat intelligence feeds
Configure cloud-enablement and block at first sight
Integrate with MDA and Microsoft Defender for Identity
Configure advanced hunting rules
Configure and demonstrate auto-remediation
Demonstrate remote removal of malware using Live Response feature
Education
Through interaction during the design & deployment phase and post-configuration training, SecOps admins, SOC engineers, and help desk techs will have an understanding of the toolset to become self-sufficient
Admins trained on how to onboard and adjust and create policies
SOC trained on hunting & remediation
Help desk trained on troubleshooting anomalies and user concerns
Expected Outcomes
Information protection can help your organization prevent, detect, and contain malware and other endpoint security issues. At the end of the engagement, you will have a working environment utilizing each of the capabilities covered during the engagement. This training and hands-on experience allows organizations to be self-sufficient with the toolset.
Learn More about eGroup Enabling Technologies Microsoft Defender for Endpoint.
Want to know how maximize the capabilities of Microsoft Defender for Endpoint?