Microsoft Defender for Endpoint MDE: Actions taken on a compromised device in MDE or MS Defender XDR

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024
  • EDR Interview Questions and Answers: • EDR Interview Question...
    Microsoft Defender for Endpoint (MDE) : Device Discovery: • Video
    Microsoft Defender for Endpoint MDE: Live Response: • Video
    Response Actions on a File: • Microsoft Defender for...
    Welcome to our series on Microsoft Defender for Endpoint (MDE) - an EDR solution, Endpoint Detection and Response. If you're interested in delving deeper into MDE, check out our playlist containing all related videos. This also includes videos on Microsoft Defender XDR. Feel free to suggest any specific topics or tools you'd like us to cover in future episodes.
    In this video, we'll walk you through: Response Actions on a Device
    • What response actions can you take on a device in MDE? What response actions can you take on a device in Microsoft Defender XDR?
    ○ How to isolate a device in MDE or Microsoft Defender XDR? - Isolate Device
    ○ How to run an Antivirus scan on a device in MDE or Microsoft Defender XDR? -- Run Antivirus Scan -- Quick Scan, Full Scan
    ○ How to restrict an application from running on a device in MDE or Microsoft Defender XDR? -- Restrict App Execution
    ○ How to run an automated investigation on a device in MDE or Microsoft Defender XDR? -- Initiate Automated Investigation
    ○ How to connect in real-time to a device in MDE or Microsoft Defender XDR? -- Initiate Live Response Session
    ○ How to forcibly release a device from isolation in MDE or Microsoft Defender XDR? -- Download force release from isolation script
    ○ How to collect investigation package from a device in MDE or Microsoft Defender XDR? --- Collect Investigation Package
    • What actions can you take on a compromised device in MDE? What actions can you take on a compromised device in Microsoft Defender XDR?
    • How to take actions on a compromised device in MDE? How to take actions on a compromised device in Microsoft Defender XDR?
    Stay tuned for upcoming videos where we'll explore alternative deployment methods, all of which will be added to the playlist for easy reference.
    Microsoft Defender for Endpoint Playlist: • Microsoft Defender for...
    Cyber Security Interview Questions and Answers: • CyberSecurity Intervie...
    #CyberPlatter #microsoft #microsoftdefender #xdr #microsoftdefenderXDR #microsoftsecurity #endpointprotection #endpoint #endpoints #endpointsecurity #EDR #xdr

ความคิดเห็น • 3

  • @srinivasulureddy1508
    @srinivasulureddy1508 4 หลายเดือนก่อน

    App combility and server installation explain

  • @krishna.gv1995
    @krishna.gv1995 3 หลายเดือนก่อน

    Please create a video on threat hunting.