Mitigate Threats Using Microsoft 365 Defender
This course will teach you how to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities needed for the Microsoft Security Operations Analyst (SC-200).
What you'll learn
In this course, Mitigate Threats Using Microsoft 365 Defender, you’ll learn to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities. First, you’ll explore how to protect endpoints. Next, you’ll discover identity protection and how to protect your productivity suite. Finally, you’ll learn how to perform cross domain investigation and hunting. When you’re finished with this course, you’ll have the skills and knowledge of mitigating threats using Microsoft 365 Defender needed to correctly deploy the protection, detection, and response capabilities within your environment.
Table of contents
- Introduction 1m
- Defender for Identity Initial Setup 4m
- Defender for Identity Playbook 2m
- Managing Defender for Identity Alerts 5m
- Cloud App Security App Connectors 2m
- Working with Cloud App Security Policies and Alerts 4m
- Configuring Identity Protection Policies 4m
- Responding to Identity Protection Alerts 5m
- Creating Conditional Access Policies 4m
- Summary 1m
- Introduction 1m
- Enabling Endpoint Integration 2m
- Enabling Baseline Security Policies 3m
- Defining Sensitivity Labels 4m
- Creating a DLP Policy 5m
- Enabling Auto Labeling 4m
- Working with Sensitivity Labels and DLP Policies 4m
- DLP within Teams 0m
- Malware Detection within Office 365 1m
- Working with Insider Risk Policies 6m
- Investigating Email 3m
- Summary 1m