
Live: Mastering Microsoft Defender for Endpoint
-
Author: Dean Ellerby
-
Level: Intermediate
-
Study time: 10 hours
This comprehensive course equips IT professionals and cybersecurity experts with the knowledge and skills to effectively deploy, configure, and manage Microsoft Defender for Endpoint. Participants will learn essential techniques in policy management, threat and vulnerability assessment, advanced threat hunting, incident response, and integration with other security tools.
Course Lessons
Course Outline
Module 1
Introduction to Microsoft Defender for Endpoint
This introductory session will provide an overview of Microsoft Defender for Endpoint, its purpose, and key features, setting the foundation for understanding how it enhances cybersecurity measures.
-
Overview of Microsoft Defender for Endpoint
-
Key features and benefits
-
Deployment options and requirements
-
Integration with other Microsoft security solutions
-
Setting up and configuring Microsoft Defender for Endpoint
-
Overview of the Microsoft 365 Defender portal
Module 2
Configuring and Managing Defender Policies
This session will focus on configuring and managing security policies within Microsoft Defender for Endpoint to protect your organization's devices and data.
-
Understanding security policies and baselines
-
Creating and managing device compliance policies
-
Configuring endpoint detection and response (EDR) policies
-
Managing firewall and network protection settings
-
Implementing attack surface reduction (ASR) rules
-
Policy monitoring and troubleshooting
Module 3
Threat and Vulnerability Management, Hunting and Incident Response
This session will cover the tools and techniques for identifying, assessing, and mitigating threats and vulnerabilities using Microsoft Defender for Endpoint.
-
Introduction to threat and vulnerability management (TVM)
-
Conducting vulnerability assessments
-
Prioritizing and remediating vulnerabilities
-
Overview of threat hunting capabilities
-
Using automated investigations and response capabilities
-
Investigating and responding to incidents
Module 4
Integration, Automation, and Reporting
The final session will focus on integrating Microsoft Defender for Endpoint with other tools, automating security tasks, and generating comprehensive reports to enhance security operations.
-
Integrating Defender for Endpoint with SIEM and other security tools
-
Using APIs and automation tools (e.g., PowerShell, Logic Apps)
-
Configuring automated response playbooks
-
Generating and customizing security reports
-
Analyzing security data for insights and trends
-
Best practices for continuous improvement and security posture management
You have access to
4 weeks of learning
3:00 PM CET - september 4th 2024
Introduction to Microsoft Defender for Endpoint
This introductory session will provide an overview of Microsoft Defender for Endpoint, its purpose, and key features, setting the foundation for understanding how it enhances cybersecurity measures.
3:00 PM CET - september 30th 2024
Configuring and Managing Defender Policies
This session will focus on configuring and managing security policies within Microsoft Defender for Endpoint to protect your organization's devices and data.
3:00 PM CET - OCTOBER 15th 2024
Threat and Vulnerability Management, Hunting and Incident Response
This session will cover the tools and techniques for identifying, assessing, and mitigating threats and vulnerabilities using Microsoft Defender for Endpoint.
3:00 PM CET - october 16th 2024
Integration, Automation, and Reporting
The final session will focus on integrating Microsoft Defender for Endpoint with other tools, automating security tasks, and generating comprehensive reports to enhance security operations
get access to
4 weeks of learning
1:00 PM CET - september 4th 2024
Introduction to Microsoft Defender for Endpoint
This introductory session will provide an overview of Microsoft Defender for Endpoint, its purpose, and key features, setting the foundation for understanding how it enhances cybersecurity measures.
3:00 PM CET - september 30th 2024
Configuring and Managing Defender Policies
This session will focus on configuring and managing security policies within Microsoft Defender for Endpoint to protect your organization's devices and data.
3:00 PM CET - OCTOBER 15th 2024
Threat and Vulnerability Management, Hunting and Incident Response
This session will cover the tools and techniques for identifying, assessing, and mitigating threats and vulnerabilities using Microsoft Defender for Endpoint.
3:00 PM CET - october 16th 2024
Integration, Automation, and Reporting
The final session will focus on integrating Microsoft Defender for Endpoint with other tools, automating security tasks, and generating comprehensive reports to enhance security operations
Created by
Dean Ellerby
Microsoft Security MVP

Don't hesitate