1.1 Minimum requirements and licensing, MDE from Zero to Hero

Jackson Felden - Cloud and Security
Jackson Felden - Cloud and Security
0 بار بازدید - 2 سال پیش - Welcome to Microsoft Defender for
Welcome to Microsoft Defender for Endpoint – From Zero to Hero, Module 1.1. Minimum requirements and licensing

Before deploying Defender for Endpoint is important to review the requirements for licensing, hardware, OS and key configuration.

In this video you will see:

1 - Licensing
2 - Hardware
3 - Windows versions and operating systems
4 - Browser
5 - Internet connectivity
6 - Data storage
7 - Configuration

**COURSE OUTLINE**
I have plans to record 20+ videos and the course outline is not set in stone. Below are the modules already available and the ones on the horizon:

1. Product Overview - https://www.seevid.ir/fa/w/Ul4Zx...
1.1 - Minimum requirements and licensing - 1.1 Minimum requirements and licensin...

2 - Design & key decisions
2.1 Design: MDE settings deployment - 2.1 Design: MDE Settings Management, ...
2.3 - Design - Best practise for full scan - 2.3 - Design - Best practise for full...
2.10 Device tag overview - 2.10 Device tag overview, MDE from Ze...
2.11 Deploying device tag via portal, GPO and Intune - 2.11 Deploying device tag via portal,...
2.12 - Device auto-tagging via Logic Apps - 2.12 Device auto-tagging via Logic Ap...

3 - MDE deployment
3.1 - Initial setup and advanced settings - 3.1 Initial setup and advanced settin...
3.2 - Deploying settings via MEM - 3.2  Deploying AV settings via MEM, M...
3.3 - Deploying settings via GPO - 3.3 Deploying AV settings via GPO, MD...

4 - Onboarding
4.1 - Onboarding overview - 4.1 Onboarding overview, MDE from Zer...
4.2 - Onboarding via GPO and local script - 4.2 Onboarding via GPO and local scri...
4.3 - Onboarding via Microsoft Endpoint Manager  - 4.3 Onboarding via MEM / Intune, MDE ...
4.4 - Onboarding via helper script - 4.4 Onboarding via helper script, MDE...
4.5 - Auto Onboarding via Defender for Cloud

5 - Migration from 3rd party solution - 5 .1 Migration from 3rd party solutio...

6 - Monitoring
6.1 - Alerts and incidents management - 6.1 Alerts & incidents management, MD...
6.2 - Ransomware attack investigation -  6.2 Ransomware attack investigation, ...
6.3 - Dealing with Ransomware via Sentinel automation - 6.3 Dealing with Ransomware via Senti...

7 - Integration with SIEM (Security Information and Event Management)

8 - Troubleshooting
8.1 - Troubleshooting mode deep dive - 8.1 Troubleshooting mode deep dive, M...
8.2 - Troubleshooting PowerShell output issue  - 8.2 Troubleshooting PowerShell output...

My Microsoft Defender for Endpoint – From Zero to Hero playlist can be accessed from
Introducing my Defender for Endpoint,...

Please consider subscribing to my channel for the latest updates and upcoming modules.

Thanks for supporting this project, I hope you enjoy and learn a lot
Thanks for watching
Jackson Felden

#MicrosoftDefenderForEndpoint #MDE #CyberSecurity
2 سال پیش در تاریخ 1401/11/27 منتشر شده است.
0 بـار بازدید شده
... بیشتر