Microsoft Defender for Endpoint Tutorial | Microsoft Defender for Endpoint Interview Questions | MDE

  Рет қаралды 9,102

CyberPlatter

CyberPlatter

Күн бұрын

Endpoint Security Interview Q&As: • Endpoint Security Inte...
EDR Interview Questions and Answers: • EDR Interview Question...
Here's a tutorial on Microsoft Defender for Endpoint (MDE) and Microsoft Defender XDR, presented in a question-and-answer format to help you learn and prepare for interviews. This is part 1, with part 2 coming up. It includes practical examples of how and why to use MDE and Microsoft Defender XDR.
Topics covered in this video:
• What are the services provided by the Microsoft 365 Defender suite and Microsoft Defender XDR?
• What is Microsoft Defender XDR?
• What us Microsoft 365 Defender suite?
• Microsoft Defender for Endpoint Overview
• What are the capabilities of MDE? Core Defender Vulnerability Management, Threat Management, Attack Surface Reduction, Next-generation protection, endpoint detection and response, automated investigation and remediation, and Microsoft threat experts.
• How to onboard clients or devices to MDE using a local script?
• How to onboard multiple clients or devices to MDE via Intune? Bulk Onboard devices to MDE via Intune.
• What is Device Discovery in MDE and Microsoft Defender XDR?
• How to discover and manage unmanaged devices in MDE?
• What are the Advanced Features in MDE and Microsoft Defender XDR?
○ Restrict correlation to within scoped device groups​
○ Enable EDR in block mode
○ Automatically resolve alerts
○ Allow or block file
○ Hide potential duplicate device records
○ Discovery of onboarded devices
○ Custom network indicators
○ Tamper protection
○ Show user details
○ Skype for business integration
○ Microsoft Defender for Cloud Apps
○ Web content filtering
○ Unified audit log
○ Device discovery
○ Download quarantined files
○ Live Response
○ Live Response for Servers
○ Live Response unsigned script execution
○ Share endpoint alerts with Microsoft Compliance Center
○ Microsoft Intune connection
○ Authenticated telemetry
○ Preview features
• How to test your antivirus with EICAR test file? AV Detection?
• Why and how to use Submissions page to submit suspected spam, phish, URLs, files, emails, email messages, Teams messages and user reported messages, and legitimate URLs, files, emails, email messages, Teams messages and user reported messages that are getting blocked, to Microsoft. Submit malware, non-malware, and other suspicious files to Microsoft for analysis.
• What is Network Protection in MDE and Microsoft Defender XDR?
• How to enabled Network Protection in MDE via Intune, PowerShell, Group Policy and Microsoft Configuration Manager
• How to enabled Network Protection in Microsoft Defender XDR via Intune, PowerShell, Group Policy and Microsoft Configuration Manager?
• What is Live Response in MDE and Microsoft Defender XDR?
• What response actions can you take on a device in MDE and Microsoft Defender XDR?
○ How to isolate a device in MDE or Microsoft Defender XDR? - Isolate Device
○ How to run an Antivirus scan on a device in MDE or Microsoft Defender XDR? -- Run Antivirus Scan -- Quick Scan, Full Scan
○ How to restrict an application from running on a device in MDE or Microsoft Defender XDR? -- Restrict App Execution
○ How to run an automated investigation on a device in MDE or Microsoft Defender XDR? -- Initiate Automated Investigation
○ How to connect in real-time to a device in MDE or Microsoft Defender XDR? -- Initiate Live Response Session ○ How to forcibly release a device from isolation in MDE or Microsoft Defender XDR? -- Download force release from isolation script
○ How to collect investigation package from a device in MDE or Microsoft Defender XDR? --- Collect Investigation Package
• What actions can you take on a compromised device in MDE and Microsoft Defender XDR?
• What response actions can you take on a file in MDE and Microsoft Defender XDR?
○ Stop and quarantine file
○ Download file
○ Collect File
○ Add Indicators - Add Indicators of Compromise - Manage Indicators
○ Deep Analysis
○ Go hunt
• What actions can you take on a suspicious file in MDE? What actions can you take on a suspicious file in Microsoft Defender XDR?
• What is Automated Investigation and Response (AIR) in MDE and Microsoft Defender XDR?
• What are the different remediation levels in MDE and Microsoft Defender XDR?
How to configure Automated Investigation and Response (AIR) in MDE and Microsoft Defender XDR?
Microsoft Defender for Endpoint Tutorial | Microsoft Defender for Endpoint Interview Questions and Answers | Microsoft Defender XDR Tutorial | Microsoft Defender XDR Interview Questions and Answers | Microsoft 365 Defender Suite | End Point Detection and Response | Extended Detection and Response
#microsoftdefender #microsoftsecurity #microsoft #endpointprotection #endpointsecurity #edr #xdr #microsoftdefenderforendpoint #microsoftdefenderxdr

Пікірлер: 14
@vijaykumarchejara
@vijaykumarchejara 6 күн бұрын
This is actual explanation of the tool with theory and practical. Whatever you explained, same thing people will do in real environment. please keep sharing the knowledge.
@bhavaychadha9629
@bhavaychadha9629 6 күн бұрын
Nicely Explained. Waiting for part 2.
@dikeshshrestha2694
@dikeshshrestha2694 2 ай бұрын
Good one. Just waiting for part 2. Also please make a video for Sentinel as well.
@sachin-tr4nc
@sachin-tr4nc 4 ай бұрын
Thank you mam, Great explanation with Nice formate for this part 1 , please continue this, One more request, please make same video for ELK(End point security)
@kaviyababu-hf2vw
@kaviyababu-hf2vw 4 ай бұрын
Great explanation, really appreciate your efforts🎉
@Viya_the_cool
@Viya_the_cool 2 ай бұрын
Really Helpful..!! pleas create one on MDCA please
@viratkumar8246
@viratkumar8246 3 ай бұрын
Is there any training for MXDR for paid training, please let me know i want to get trained from your institute especially from you.
@chethankumar3687
@chethankumar3687 Ай бұрын
Can you make videos for microsoft perview
@rajeshmoravaneni
@rajeshmoravaneni 4 ай бұрын
Hello, Do you provide SOC Analyst training like One to One? If yes, I am interested to take class.
@JerryM365
@JerryM365 3 ай бұрын
Same here please comment
@narasimhamocherla8976
@narasimhamocherla8976 4 ай бұрын
Hello madam. Can you do video on CSPM (cloud security posture management?
@JerryM365
@JerryM365 3 ай бұрын
❤Great very helpful
@irfankazi3518
@irfankazi3518 3 ай бұрын
Very helpful
Microsoft Defender for EndPoint Tech Overview!
25:18
Andy Malone MVP
Рет қаралды 39 М.
😜 #aminkavitaminka #aminokka #аминкавитаминка
00:14
Аминка Витаминка
Рет қаралды 608 М.
Synyptas 4 | Жігіттер сынып қалды| 3 Bolim
19:27
kak budto
Рет қаралды 1,3 МЛН
VAMPIRE DESTROYED GIRL???? 😱
00:56
INO
Рет қаралды 6 МЛН
Learn How to Configure Defender for Office 365 for Maximum Security
30:22
Securing your Cloud with Azure Services
58:34
Bespoke Training
Рет қаралды 147
Microsoft Defender for Endpoint: The Simplified Way!
13:56
Jonathan Edwards
Рет қаралды 52 М.
A quick guide to Defender for Endpoint deployment via Microsoft Intune
19:36
Getting started with Microsoft Defender XDR products
57:40
Vignesh Ganesan
Рет қаралды 2,7 М.
Hands-On Power BI Tutorial 📊Beginner to Pro [Full Course] ⚡
3:05:45
Pragmatic Works
Рет қаралды 2,2 МЛН