1. Product Overview, MDE from Zero to Hero

Описание к видео 1. Product Overview, MDE from Zero to Hero

Welcome to Defender for Endpoint – From Zero to Hero, Module 1: Product Overview

In this video you will see:

1 – Understanding the main Defender for Endpoint components
2 – Real benefits
3 - Demo

**COURSE OUTLINE**
I have plans to record 20+ videos and the course outline is not set in stone. Below are the modules already available and the ones on the horizon:

1. Product Overview - https://www.youtube.com/watch?v=Ul4Zx...
1.1 - Minimum requirements and licensing -    • 1.1 Minimum requirements and licensin...  

2 - Design & key decisions
2.1 Design: MDE settings deployment -    • 2.1 Design: MDE Settings Management, ...  
2.3 - Design - Best practise for full scan -    • 2.3 - Design - Best practise for full...  
2.10 Device tag overview -    • 2.10 Device tag overview, MDE from Ze...  
2.11 Deploying device tag via portal, GPO and Intune -    • 2.11 Deploying device tag via portal,...  
2.12 - Device auto-tagging via Logic Apps -    • 2.12 Device auto-tagging via Logic Ap...  

3 - MDE deployment
3.1 - Initial setup and advanced settings -    • 3.1 Initial setup and advanced settin...  
3.2 - Deploying settings via MEM -    • 3.2  Deploying AV settings via MEM, M...  
3.3 - Deploying settings via GPO -    • 3.3 Deploying AV settings via GPO, MD...  

4 - Onboarding
4.1 - Onboarding overview -    • 4.1 Onboarding overview, MDE from Zer...  
4.2 - Onboarding via GPO and local script -    • 4.2 Onboarding via GPO and local scri...  
4.3 - Onboarding via Microsoft Endpoint Manager -    • 4.3 Onboarding via MEM / Intune, MDE ...  
4.4 - Onboarding via helper script -    • 4.4 Onboarding via helper script, MDE...  
4.5 - Auto Onboarding via Defender for Cloud

5 - Migration from 3rd party solution -    • 5 .1 Migration from 3rd party solutio...  

6 - Monitoring
6.1 - Alerts and incidents management -    • 6.1 Alerts & incidents management, MD...  
6.2 - Ransomware attack investigation -    • 6.2 Ransomware attack investigation, ...  
6.3 - Dealing with Ransomware via Sentinel automation -    • 6.3 Dealing with Ransomware via Senti...  

7 - Integration with SIEM (Security Information and Event Management)

8 - Troubleshooting
8.1 - Troubleshooting mode deep dive -    • 8.1 Troubleshooting mode deep dive, M...  
8.2 - Troubleshooting PowerShell output issue -    • 8.2 Troubleshooting PowerShell output...  

My Microsoft Defender for Endpoint – From Zero to Hero playlist can be accessed from
   • Introducing my Defender for Endpoint,...  

Please consider subscribing to my channel for the latest updates and upcoming modules.

Thanks for supporting this project, I hope you enjoy and learn a lot
Thanks for watching
Jackson Felden

#MicrosoftDefenderForEndpoint #MDE #CyberSecurity

Комментарии

Информация по комментариям в разработке