Getting Started with Microsoft Defender for Endpoint: Threat and Vulnerability Management

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ก.ค. 2024
  • In this video, we dive into the Threat and Vulnerability (TVM) module of MDE. This tool helps us keep devices and software from being exposed to threats and also gives insight into what we need to do to improve security posture in our environment.
    docs.microsoft.com/en-us/micr...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 21

  • @benjaminpotts2562
    @benjaminpotts2562 ปีที่แล้ว +2

    I’m a couple of weeks from piloting this before a 2000 seat deployment so this video has been really useful. Off to watch your others

  • @aubreevitro9943
    @aubreevitro9943 2 ปีที่แล้ว +3

    I appreciate this refined tutorial on how to improve my security posture. You’ve made this seemingly difficult task more approachable.

  • @leeezyf
    @leeezyf 2 ปีที่แล้ว +2

    This information is really helping me out!! I came across your channel by chance, and now you’re my go to for everything security related!!!!

  • @michaeljensen1625
    @michaeljensen1625 ปีที่แล้ว +1

    This was a really great tutorial. Thank you very much. I'd love your take on Attack Surface Reduction. I don't love the brief overview videos I've seen before. I'd like your more in depth walk-through. You do a great job.

  • @jg-365
    @jg-365 ปีที่แล้ว +1

    This is a great video. Thank you for taking the time to put them together.

  • @LonelyWolf7679
    @LonelyWolf7679 ปีที่แล้ว

    Thank you brother. It helped me a lot

  • @jigyasugulati
    @jigyasugulati ปีที่แล้ว +1

    Great stuff and thanks for sharing!! I am eagerly waiting for the next video in the series.

  • @sikhumbuzomthombeni5903
    @sikhumbuzomthombeni5903 ปีที่แล้ว

    Thanks so much. This really helped understand how Defender TVM actually works. Really enlightening.

  • @NwaAda1
    @NwaAda1 ปีที่แล้ว

    love this so much

  • @abhiandprats
    @abhiandprats ปีที่แล้ว

    Thank you for this video. Integration of MDE with SIEM. MDE Proxy configuration. Firewall and Antivirus configuration through MDE and migration from 3rd party to MDE

  • @aramideagunloye6533
    @aramideagunloye6533 ปีที่แล้ว

    This video will help me in my new role. I will watch it over and over again. Also, could you share with me the link for Threat hunting trainings? Thanks a lot

  • @s.m.shehrozealialam6039
    @s.m.shehrozealialam6039 ปีที่แล้ว

    Hey man, Appreciate the content and also have some questions to asked such as can we update the winows os 11 and microsoft office and zoom for windows and mac through request remediation. Also, it will automatically update, or users have to do it manually and block rule will be suitable for this.

  • @awaken477
    @awaken477 ปีที่แล้ว +1

    Great video, maybe a tutorial about threat hunting in Microsoft Defender for Endpoint

  • @the_fatshark
    @the_fatshark 2 ปีที่แล้ว +1

    Great stuff and information. I missed that new feature 'mitigation (beta)' that's pretty cool but i'm curious how well this works and mainly because if you block Chrome 3.1 for example can user still use Chrome 3.1.1 and Will it not affect Edge (based on Chrome) ? Are you going to do a video about best-practices when implementing DFE? I mean which policies and settings to enable for win10/11 but also for Servers when using DFE for server ?

    • @mountaineersecurity
      @mountaineersecurity  2 ปีที่แล้ว +1

      Thank you! Yes, the way this is supposed to work is for the feature to block based on app version instead of the entire app. Blocking versions of Chrome should not affect Chromium Edge.
      Yes! I will be doing a video soon on MDE best practices for Win 10/11 and Servers! Stay tuned!

  • @BadWeatherfreak
    @BadWeatherfreak ปีที่แล้ว

    I need advise to get in to cybersecurity. I have no IT background should I focus on 365 defender to get a job with Microsoft or other company that uses this software?

    • @AFlyingMayMay
      @AFlyingMayMay ปีที่แล้ว

      You need to develop basic IT skills before even thinking about cybersecurity