Introduction
Threat protection
()
What you should know
()
Lab setup
()
1. Implement an Enterprise Hybrid Threat Protection Solution
Plan a Microsoft Defender for Identity solution
()
Install and configure Microsoft Defender for Identity
()
Monitor and manage Microsoft Defender for Identity
()
2. Implement Device Threat Protection
Plan a Microsoft Defender for Endpoint solution
()
Implement Microsoft Defender for Endpoint
()
Manage and monitor Microsoft Defender for Endpoint
()
3. Implement and Manage Device and Application Protection
Plan for device and application protection
()
Configure and manage Microsoft Defender Application Guard
()
Configure and manage Microsoft Defender Application Control
()
Configure and manage exploit protection
()
Configure Secure Boot
()
Configure and manage Windows device encryption
()
Configure and manage non-Windows device encryption
()
Plan for securing application data on devices
()
Implement application protection policies
()
4. Implement and Manage Microsoft Defender for Office 365
Configure Microsoft Defender for Office 365
()
Monitor Microsoft Defender for Office 365
()
Conduct simulated attacks using Attack Simulator
()
5. Monitor Microsoft 365 Security with Azure Sentinel
Plan and implement Azure Sentinel
()
Configure playbooks in Azure Sentinel
()
Manage and monitor Azure Sentinel
()
Respond to threats in Azure Sentinel
()
Ex_Files_MS_365_Security_Admin_MS_500.zip
(544 KB)