Microsoft Defender course/training: Learn how to use Microsoft Defender

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 ต.ค. 2024
  • Watch this video to learn information on how to use and manage Microsoft Defender
    GET THE FULL COURSE HERE: bit.ly/4108pHM
    CONCEPTS COVERERED IN THIS VIDEO:
    Microsoft 365 Defender as an Extended Detection and Response (XDR)
    *Visualizing the concepts of extended detection and responses (XDR)
    *Configuring the Microsoft 365 Defender simulation lab
    *Performing an attack using the simulation lab
    *Microsoft 365 Defender incidents and automated investigations
    *Microsoft 365 Defender action and submissions
    *Using Kusto Query Language (KQL) for threat identification
    *Microsoft Secure Score
    *Microsoft 365 Defender threat analytics
    *Custom detections and alerts
    Getting started w/ Defender for Cloud,Defender for Servers & Defender for DevOps
    *Introduction to Microsoft Defender for Cloud
    *Regulatory compliance policies along with MCSB
    *Remediations with secure score in Microsoft Defender for Cloud
    *Microsoft Defender for Servers
    *Microsoft Defender for DevOps
    *Microsoft Defender External Attack Surface Management (EASM)
    GET THE REST OF THE BELOW CONCEPTS IN THE FULL COURSE HERE: bit.ly/4108pHM
    Basic concepts of the Microsoft Defender Suite and Services
    *The Microsoft 365 Defender Suite
    *Using the Defender and Purview admin centers
    Microsoft Defender for Office 365
    *What is Microsoft Defender for Office 365?
    *Implementing policies for uses in Email, SharePoint, OneDrive, and Teams
    *Dealing with threats using Defender for Office 365
    *Performing a campaign email attack simulation in Microsoft Defender
    Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)
    *Understanding the concepts of Microsoft Defender for Cloud Apps
    *Investigating security risks in Defender for Cloud Apps
    *Concepts of data loss prevention in Microsoft Defender
    *Alerts with data loss prevention policies (DLP)
    *Data loss prevention (DLP) policy alert investigation
    Microsoft Defender for Endpoint and Defender Vulnerability Management
    *Understanding Microsoft Defender for Endpoint concepts
    *Deploy a Windows 11 VM endpoint
    *Attack surface reduction (ASR) support with Intune
    *Working with device onboarding regarding Defender for Endpoint
    *Something to be aware of about extra features
    *Endpoint advanced features, alerts and incidents
    *Endpoint vulnerabilities
    *Device attack surface reduction (ASR)
    *Device groups with Defender for Endpoint
    *Microsoft Defender Vulnerability Management risk identification
    *Endpoint threat indicators
    *Device discovery of unmanaged devices
    Microsoft Defender for Identity
    *Microsoft Entra ID security risk mitigation
    *Concepts of using Microsoft Entra Identity Protection
    *Microsoft Entra Identity Protection security risk mitigation
    *Microsoft Entra Identity Protection risks in regards to Microsoft Defender
    *Microsoft Defender for Identity concepts
    *Using Defender for Identity to mitigate threats with AD DS
    Microsoft Defender for Cloud full management and configurations
    *Settings config in Microsoft Defender for Cloud
    *Roles in Microsoft Defender for Cloud
    *Cloud workload protection
    *Automation of onboarding Azure resource
    *Azure Arc connections
    *Multi-cloud connections
    *Email notifications in Microsoft Defender for Cloud
    *Using alert suppression rules
    *Workflow automation configuration in Defender for Cloud
    *Using sample alerts and incidents
    *Using Microsoft Defender for Cloud recommendations
    *Security alerts and incidents in Microsoft Defender for Cloud
    *Using threat intelligence reports with Microsoft Defender for Cloud
    Dealing with insider risks in Microsoft 365
    *Concepts of insider risk policies
    *Insider risk policy generation
    *Insider risk policy alert investigation
    Audit and search capabilities in Microsoft Defender and Microsoft Purview
    *Licensing of unified audit logging
    *Permissions for unified auditing
    *Threat hunting with unified audit logging
    *Threat hunting with Content Searches
    Conclusion
    *Cleaning up your lab environment
    *Getting a Udemy certificate
    *BONUS Where do I go from here?

ความคิดเห็น • 47

  • @examlabpractice
    @examlabpractice  7 หลายเดือนก่อน +1

    Get access to all my courses for a discount here:
    examlabpractice.com/courses

  • @cartma24
    @cartma24 หลายเดือนก่อน +4

    I would have loved to have found this video 18 months ago where I did not know nothing about domains. These first 43 minutes are the simplest yet fullest way I have seen domains explained

  • @cornelliouspollard273
    @cornelliouspollard273 13 วันที่ผ่านมา

    This video training is absolutely outstanding. I don't think I have had a better or more thorough training than this before. I have digested every single thing you taught and can regurgitate it back to anyone now. Phenomenal!

  • @skbakshiazeem
    @skbakshiazeem 20 วันที่ผ่านมา

    It took me to my old days where we used to insert 35 floppies to install a Windows OS. No MS office but only Wordstar. It was a story well explained in lay mans terms. Now things have changed drastically. We need to cope up with new technologies. But experience matters. IT operations, People Management and Risk analysis, all needs experience. Being an SME is good but the more videos we watch or inputs we get the better it prepares for Project implementations. Kudos.

  • @kikibah1363
    @kikibah1363 7 หลายเดือนก่อน +5

    God blessed you for this wonderful gift I had zaro knowledge but now I am so knowledgeable after this video am so happy thank you

  • @miguelbecerra7005
    @miguelbecerra7005 21 วันที่ผ่านมา

    WoW this is absolutely Awesome how clear you explain all these concepts!!! Thank you for the video!!

  • @nasyaramadhana6788
    @nasyaramadhana6788 10 หลายเดือนก่อน +7

    Thank for video. Currently i work as soc analyst and my daily task is analyze with microsoft defender

    • @cricketclub.youtube
      @cricketclub.youtube 5 หลายเดือนก่อน

      please provide your instagram id bro.. I also working as an soc analyst

  • @BashirShaikh-zl3zh
    @BashirShaikh-zl3zh 6 หลายเดือนก่อน

    J Christopher i dont hv words i wanted to appriciate you for such video. I am working as soc analyst still your video helped me to clear my basics ...

  • @Hometube0001
    @Hometube0001 2 หลายเดือนก่อน +2

    Wow.... I will encourage the new IT folks to listen to the begning IT concepts explained in the video... ❤ best video

    • @cartma24
      @cartma24 หลายเดือนก่อน

      For real

  • @ericzliu
    @ericzliu 5 หลายเดือนก่อน +3

    an hour into this video and I can say your teaching style is very easy to grasp and helpful! thank you and keep doing what you're doing

  • @kitfo18
    @kitfo18 10 หลายเดือนก่อน +5

    This is a major help if you are taking the SC-300 exam but good to know if you do just about anything with in Entra ID! Awesome video will be watching this one a few times for sure.

  • @fastrobreetus
    @fastrobreetus หลายเดือนก่อน +1

    You are so knowledgeable. Great video. TY!

  • @gustavoadolfoguzmancapera5143
    @gustavoadolfoguzmancapera5143 7 หลายเดือนก่อน +2

    Awesome training sessions. Thanks John.

  • @amarilnto
    @amarilnto 10 หลายเดือนก่อน +1

    Amazing video explaining the basics in #IT is very important so new students can join and understand in a better way. Your method of teaching is wonderful kudos for your help 🙏☺️🖥️🥇🚀

  • @Neng.Sunate
    @Neng.Sunate 9 หลายเดือนก่อน +1

    thank you for your video , very useful training video.

  • @megmucklebones7538
    @megmucklebones7538 10 หลายเดือนก่อน +1

    Amazing content, thank you for everything.

  • @jfjtlx433
    @jfjtlx433 9 หลายเดือนก่อน +1

    Great explanation.

  • @elazarOhayon
    @elazarOhayon 8 หลายเดือนก่อน +2

    Great Content!!

  • @dilanzuniga9440
    @dilanzuniga9440 หลายเดือนก่อน +1

    Thank you!!!!

  • @TheCnstgrad
    @TheCnstgrad 8 หลายเดือนก่อน

    Does your udemy course linked in the description depend on using the deprecated evaluation lab feature?

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      It is 3 small videos in the course. Everything else is fine. I have left them in the course to show the demonstrations. As soon as Microsoft releases an updated lab, I will update the content with something better.

  • @dannyroy8571
    @dannyroy8571 9 หลายเดือนก่อน

    Nice Sharing..!!
    But had an question regarding "Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)" - lets say suppose for this azure recommendation i want to turn off scanning of old images images and only with the latest tag should be scanned and rest all should be ignored - How can i do it soo ?? Need to Improve my Azure secure score

    • @examlabpractice
      @examlabpractice  9 หลายเดือนก่อน

      To focus vulnerability scanning on only the latest images or specific tags within your Azure Container Registry and improve your Azure secure score, you'll need to customize the scanning policies. Microsoft Defender for Cloud, formerly known as Azure Security Center, provides a way to manage and enforce security policies across your Azure resources, including the Container Registry. Here's how you might approach this:
      Access Microsoft Defender for Cloud:
      Go to the Azure portal.
      Open Microsoft Defender for Cloud.
      Navigate to the 'Environment settings' under the 'Management' section.
      Select the Subscription and Container Registry:
      Choose the subscription where your container registry is located.
      Select the specific container registry you want to configure.
      Configure the Security Policy:
      Find the policy related to container image scanning (like "Vulnerabilities in Azure Container Registry images should be remediated").
      Modify the policy to specify that only images with the 'latest' tag or images newer than a certain age should be scanned. This might involve setting custom parameters or exclusions.
      Implement Tagging Strategies:
      Ensure your image deployment process is tagging images correctly. Consistently use the 'latest' tag for the most recent and relevant images you want to be scanned.
      Older or less critical images should have different tags that don't get picked up by the policy.
      Automation and Scripting:
      Consider using Azure CLI or PowerShell scripts to automate the process of tagging and untagging images. You can write scripts to retag older images and ensure only the latest images retain the 'latest' tag.
      Monitor and Review:
      Regularly monitor the results of the scans and the security recommendations in Microsoft Defender for Cloud.
      Review and adjust your policies and tagging strategies as needed to ensure that only the desired images are being scanned.
      Consult Documentation and Support:
      Azure's documentation and support channels can provide specific guidance and best practices for setting up and customizing your vulnerability scanning policies.
      By effectively managing your scanning policies and image tags, you can focus security resources on the most relevant container images and improve your Azure secure score. Keep in mind that while focusing on the latest images can reduce noise and overhead, it's also crucial to ensure that all deployed images, not just the latest, are secure and compliant. Regularly review and update your policies and practices to balance security with efficiency.

  • @GH-NET
    @GH-NET 10 หลายเดือนก่อน +1

    Thank you!

  • @tsnazzle
    @tsnazzle 10 หลายเดือนก่อน +1

    Thanks for this training however, it seems like intro sound is way too loud - had a jump scare haha.

    • @examlabpractice
      @examlabpractice  10 หลายเดือนก่อน

      lol sorry for the jump scare

    • @mui25
      @mui25 9 หลายเดือนก่อน

      pls help onthis You have a Microsoft 365 subscription that has Microsoft 365 Defender enabled.
      You need to identify all the changes made to sensitivity labels during the past seven days.
      What should you use?
      A. the Incidents blade of the Microsoft 365 Defender portal
      B. the Alerts settings on the Data Loss Prevention blade of the Microsoft 365 compliance center
      C. Activity explorer in the Microsoft 365 compliance center
      D. the Explorer settings on the Email & collaboration blade of the Microsoft 365 Defender portal @@examlabpractice

  • @stantkatchenko1341
    @stantkatchenko1341 29 วันที่ผ่านมา

    Hi John and whoever is in the know,
    I will refrain from claiming expertise in Microsoft security technologies and but do have some (20y +) security experience. I attended to a company which just moved many reasonably complex systems to Azure and deployed Defender and Sentinel. They engaged Microsoft partner company which had done everything ‘rather quickly’…
    I looked at findings and proved that 80% of what Microsoft calls ‘incidents’ while everyone else uses term ‘security events’ were false positives. Nobody investigated anything at all. I failed to figure out what remaining 20% was all about. ‘Partner company’ pointed me to Microsoft website. Microsoft promised to send somebody in a month or so.. I don’t want to blame anybody except myself. So, what went wrong there? Is it possible to get it to work? If yes, than how?

    • @examlabpractice
      @examlabpractice  28 วันที่ผ่านมา

      It sounds like a combination of several issues might have contributed to the situation:
      Rushed Deployment: Moving complex systems to Azure and deploying Defender and Sentinel quickly may have caused configuration issues. Security technologies like Microsoft Defender and Sentinel require careful tuning to match the specific environment, which takes time.
      Lack of Tuning and Customization: Microsoft Sentinel and Defender come with default settings, which can often generate a high number of alerts. These "incidents" are typically based on predefined rules and might not account for the nuances of your environment. If the deployment was rushed, it’s likely that the security rules weren't properly tuned, leading to a high number of false positives.
      No Incident Triage Process: Not having a process in place to investigate and triage alerts might have led to those incidents being neglected. Even if the tools work, human oversight is crucial to filtering out false positives and focusing on real threats.
      Lack of Expertise in Investigation: If the partner company didn't have enough expertise or resources for detailed investigations, that might explain why they pointed you to general Microsoft documentation instead of offering tailored assistance.
      Steps to Improve
      Tuning Sentinel and Defender: You can significantly reduce false positives by tuning Sentinel’s analytics rules and creating custom detection rules that align with your environment. This involves:
      Reviewing Default Rules: Disable or modify rules that generate too many false positives.
      Threshold Adjustments: Adjust thresholds or conditions for specific detection rules.
      Adding Whitelists: Set up exclusions for known and trusted traffic or behaviors to avoid redundant alerts.
      Machine Learning & User Behavior Analytics: Use more advanced features in Defender and Sentinel to adapt to typical behaviors and detect true anomalies.
      Incident Response Playbooks: Implement automatic playbooks for handling certain types of incidents. For example, if a certain pattern of behavior is always a false positive, you can automate a response to mark it as such and focus on higher-priority alerts.
      Train or Involve Your Security Team: A well-trained internal security team should manage the investigation of the remaining 20% of alerts. They will need access to detailed log data and will need to know how to use the tools.
      Leverage Microsoft’s Security Experts: Since Microsoft has promised assistance, work with them to conduct a proper assessment of your configuration and guide you through improving the alerting system. Their experience in tuning Sentinel for specific environments can be valuable.
      Engage a Better-Qualified Partner: If you feel the current partner didn't provide adequate support, it might be worth engaging another partner with proven expertise in Sentinel/Defender and Azure security best practices.
      The key to success is ongoing tuning, automation, and having a dedicated team to analyze incidents. With proper configuration, both Defender and Sentinel can become effective tools in identifying and responding to real threats.

    • @stantkatchenko1341
      @stantkatchenko1341 28 วันที่ผ่านมา

      @@examlabpractice Thanks a lot John.. I am sure it is a pleasure working with you. I agree with you 100%. My approach was quite similar.. I wanted to start from scratch and do everything properly or alternatively use battle proven Palo Alto. The second option was purely theoretical. As for the first one I honestly didn’t know how long it could take and whether it would deliver any value by the end of the day. Your message kind of indicates that it is possible and my good friends from Palo, CRWD and Thales just had to be ‘loyal to their flags’. So, is there a reference site where things just work’?? (I am seeking YES or NO to that.).. I mean two months of password spray investigation cannot be considered as a reference site particularly when it was done by folks who thought that executive email accounts could be protected by ordinary passwords and environments segregation was an unnecessary luxury.. (I assume it is well-known story)

  • @zt296
    @zt296 8 หลายเดือนก่อน

    What else can we use as evaluations and tutorials have been deprecated as of 18/01/2023

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      Microsoft has not released anything new. Please understand that the deprecated section is a VERY small section. Everything else is still very much up to date

  • @spmffl3048
    @spmffl3048 8 หลายเดือนก่อน

    Do you need an E5 license to perform the lab? I have an E3 and do not see it.

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      E5 to do everything. I would recommend you get a free Microsoft E5 developer account. Do a google search and you can learn how to open one

  • @antwan3026
    @antwan3026 8 หลายเดือนก่อน

    The evaluation lab is deprecated, any idea of a workaround?

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      At the moment, no. I'm VERY frustrated about it. Microsoft gave the training industry almost no warning about this. Hopefully they'll come out with something to replace it soon because there isn't really any way for someone to test anything out on your own without trial by fire

    • @antwan3026
      @antwan3026 8 หลายเดือนก่อน

      @@examlabpractice Thanks for your response, I'm trying to learn, almost losing my mind searching everywhere for a workaround 😀

  • @antwan3026
    @antwan3026 8 หลายเดือนก่อน

    Anyone know how I can generate alerts in the new defender (XDR), not sure how to complete this training without looking at incidents

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      Unfortunately it’s hard now that they took the lab away. But I plan to update with a solution when I can. Once solution is to setup a virtual machine and join it, then inject it with malware. By the way, this is just a sample of my full course. The full course goes deeper into defender. See description for details

    • @antwan3026
      @antwan3026 8 หลายเดือนก่อน

      @@examlabpractice I’ve got the full training on udemy

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      Great, well I am hoping A) Microsoft will provide a solution soon. B) I can find my own solution. For now, I would recommend you move on. This is really just a small part of the course anyway. It only involves 3 videos in the whole course. Also, you can also message me on udemy as opposed to here. I respond just as quick there as I do here ;)

  • @amitaggarwal-c6w
    @amitaggarwal-c6w 8 หลายเดือนก่อน

    i am unable to install defender agent getting error on all windows 2012R2 servers 2012 R2 - MpAsDesc.dll 310

    • @examlabpractice
      @examlabpractice  8 หลายเดือนก่อน

      My understanding of defender agent is that it does not natively support 2012 R2. It natively supports 2016 and higher

    • @TheKrish420
      @TheKrish420 8 หลายเดือนก่อน

      l we have more than 500 servers and customers don't want to upgrade. Do you have any troubleshooting steps which I can follow?