Microsoft Defender for Endpoint | RBAC | SOC Tiering | Portal Configuration

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 ต.ค. 2024
  • #Microsoft #Security #EndpointSecurity #MDATP #WDATP #MicrosoftDefender #MicrosoftSecurity
    What is Microsoft Defender for Endpoints?
    Role Based Access control in Microsoft Defender for Endpoint?
    Azure AD roles which have access to Microsoft Defender for endpoint portal
    Role based Access control for Microsoft Defender for Endpoint portal
    SOC tiering model
    Device Group
    Creation of Groups In Azure AD
    Creation of Roles in Microsoft Defender for Endpoint portal
    Creation of Device Group in Microsoft Defender for Endpoint Portal
    Assigning users to the respective roles
    Microsoft Article -
    docs.microsoft...
    docs.microsoft...
    docs.microsoft...
    Microsoft Defender - What is Microsoft Defender for Endpoint? - • Microsoft Defender - W...
    Microsoft Defender for Endpoint Tutorial - • Microsoft Defender for...
    Microsoft Defender for Endpoint - Role based Access Control | SOC Tiering - • Microsoft Defender for...
    Microsoft Defender for Endpoint | RBAC | SOC Tiering | Portal Configuration - • Microsoft Defender for...
    Onboard Windows 10 Devices | Microsoft Defender for Endpoints | MDATP | Local Script - • Onboard Windows Device...
    Onboard Windows Devices | Microsoft Defender for Endpoints | MDATP | Local Script - • Onboard Windows Device...
    Onboard Windows Devices from GPO | Microsoft Defender for Endpoint - • Onboard Windows Device...
    Onboard Windows Devices from MDM | Microsoft Defender for Endpoint - • Onboard Windows Device...
    Microsoft Defender for Endpoint | Onboarding Windows Server 2019 - • Microsoft Defender for...
    Microsoft Defender for Endpoint | Onboarding Windows Server 2016 - • Microsoft Defender for...
    Microsoft Defender for Endpoint | Onboarding Windows Server 2012 R2 - • Microsoft Defender for...
    Microsoft Defender for Endpoint for Linux - • Microsoft Defender for...
    Microsoft Defender for Endpoint | Onboarding Linux Servers - • Microsoft Defender for...
    Detailed Deployment Video | Microsoft Defender For Endpoint - • Detailed Deployment Vi...
    Microsoft Defender for Endpoint | Threat and Vulnerability Management - • Microsoft Defender for...
    Getting Started with Threat and Vulnerability Management | Microsoft defender for Endpoint - • Getting Started with T...
    Threat and Vulnerability Management - Dashboard | Microsoft Defender for Endpoint - • Threat and Vulnerabili...
    Threat and Vulnerability Management - Weaknesses | Microsoft Defender for Endpoint - • Threat and Vulnerabili...
    Security Recommendation and Remediation | Microsoft Defender for Endpoint - • Security Recommendatio...
    Threat and Vulnerability Management - Software Inventory | Microsoft Defender for Endpoint - • Threat and Vulnerabili...
    Microsoft Defender for Endpoint | API | Basics and Fundamentals - • Microsoft Defender for...
    Use postman to access Microsoft Defender for endpoint API - • Use postman to access ...
    Microsoft Defender for Endpoint API | Query Any Entity Set - • Microsoft Defender for...
    Microsoft Defender Application guard | Attack Surface Reduction - • Microsoft Defender App...
    Microsoft Defender Application Guard | Standalone Mode - • Microsoft Defender App...
    Microsoft Defender Application Guard | Enterprise Mode | Capability Showcase - • Microsoft Defender App...
    Microsoft Defender Application Guard | Enterprise Mode | Configuring GPO | Part 1 - • Microsoft Defender App...
    Microsoft Defender Application Guard | Domain Joined Machine - • Microsoft Defender App...
    What is attack surface reduction rule? | Microsoft Defender for Endpoint - • What is attack surface...
    Attack Surface Reduction Rules | Deployment Methods and Modes - • Attack Surface Reducti...
    Attack Surface Reduction | Deployment workflow | Microsoft Defender for Endpoint - • Attack Surface Reducti...
    Configure Attack Surface Reduction rules | PowerShell - • Configure Attack Surfa...
    Configure Attack Surface Reduction Rules | Group Policy - • Configure Attack Surfa...
    Deploy Attack Surface Reduction Rules from Microsoft Intune - • Deploy Attack Surface ...
    Ransomware Protection | Controlled Folder Access | Microsoft Defender for Endpoint - • Ransomware Protection ...
    Ransomware Protection | Configure Controlled folder Access | Microsoft defender for Endpoint - • Ransomware Protection ...
    Ransomware Protection | Enable Controlled Folder Access from Group Policy Object |Microsoft Defender - • Ransomware Protection ...
    Ransomware Protection | Enable Controlled Folder Access from Microsoft Intune | Microsoft Defender - • Ransomware Protection ...

ความคิดเห็น • 17

  • @atulhonnangi828
    @atulhonnangi828 หลายเดือนก่อน

    I see this was uploaded 3 years ago, but today also this video is super helpful in terms of explanation and examples you provided.

  • @maheswararaju7411
    @maheswararaju7411 2 ปีที่แล้ว +2

    Thanks for the good session.
    Just to summarize the session.. Create User groups in AAD and have members in that group. Create custom role with set of permissions defined and append this role to created AAD groups. Lastly get the device groups created and mapped to the user groups( If needed, filter to specific users)..
    Please correct me if anything wrong..

  • @chirojitsarkar
    @chirojitsarkar 3 ปีที่แล้ว +4

    I am a huge admirer of your work... Have cleared many basics from your videos .. Could you please also make a video/playlist for Microsoft DLP?

  • @in25amiya
    @in25amiya 3 ปีที่แล้ว +1

    Awesome learning.. Please more and more with this topic

  • @arushisaraswat874
    @arushisaraswat874 2 ปีที่แล้ว +1

    Thanks for sharing your knowledge 🙂

  • @mramay1
    @mramay1 3 ปีที่แล้ว +1

    Great work, very detail explanation

  • @saibomma3758
    @saibomma3758 2 ปีที่แล้ว

    Excellent Explanation. i have a below query..
    If a device XYZ is having multiple tags and a group for it. if the device is remerged and again onboarded to MDE, is those all TAGS and GRUOP remains same, or those will be erased.?

  • @AmjadKhan-zj6qf
    @AmjadKhan-zj6qf ปีที่แล้ว

    Amazing explanation 👏

  • @senthilramaswamy5917
    @senthilramaswamy5917 3 ปีที่แล้ว

    I am big fan of your videos. You mention regularly that you are going to post the details or share the Excel in description but I don't see any link in description of videos. May I ask where is the link or public domain ?
    I have seen some excel you said going to share in public domain but couldn't find out.

    • @ConceptsWork
      @ConceptsWork  3 ปีที่แล้ว

      www.linkedin.com/company/conceptswork

  • @dariussams178
    @dariussams178 2 ปีที่แล้ว

    Can the implementation of Microsoft Defender for Endpoint forces all devices to reboot?

  • @sachinmalhotra3709
    @sachinmalhotra3709 2 ปีที่แล้ว

    I have 1 questions can anyone one please answer, defender for endpoint or sentinel which has a better scope?

    • @ConceptsWork
      @ConceptsWork  2 ปีที่แล้ว

      Defender for endpoint is edr and tvm solution, whereas sentinel is siem, they both have different scope.