Thank you for this amazing video series. Between reading all of ms learn and watching your video series i was able to pass the exam! Keep up the amazing work!
Great breakdown of Microsoft Defender for Office 365 features! Which of these configurations do you find most impactful for improving overall security posture?
I don't consider any one setting that impactful. My philosophy is very much grounded in the principles of Defence in Depth - across all Security, Compliance, and Identity solutions such as the Defender suite, Entra, and Purview.
@peter it is very useful learning video,Thanks for it,I have small doubt what is "priority" in policies(for example :threat policies-Lowest,0 are the values shown in this video ),how it works ?can you share some insights about this
Thank you. Yes the priority means that rules / policies are processed starting from 0, then 1, and so on. So there is an order and if users are affected by more than one policy, the lowest number gets done first.
@@prass65prassan In most cases, the lower priority should be the least restrictive settings, and as it progresses through, it builds up to the most restrictive. This is especially true in Purview with Sensitivity labels for example.
Thank you Peter, I really need this to learn about M365 Defender. Is it possible to create a test enviroment with "fake" devices that have data in Microsoft Defender?
No Microsoft is right they are offenders. As the owner of a company you should be away of who the offenders are when it comes to your company protection. Otherwise great video overall. A lot of valuable information put in a compact presentation give everything that is covered. Added to subscribe for sure!
Thank you for this amazing video series. Between reading all of ms learn and watching your video series i was able to pass the exam! Keep up the amazing work!
Great job! I’m happy to hear you passed. Thanks for the lovely feedback. 😊
Great video as always. Thank you Peter.
Glad you enjoyed it. Thank you. 🙏🏻
Great breakdown of Microsoft Defender for Office 365 features! Which of these configurations do you find most impactful for improving overall security posture?
I don't consider any one setting that impactful. My philosophy is very much grounded in the principles of Defence in Depth - across all Security, Compliance, and Identity solutions such as the Defender suite, Entra, and Purview.
Very interesting Attack simulator training!! Great video Peter, I love how you teach every section of the portal
Thank you so much. ☺️
Another great one Peter. Cheers !
You are most kind Rob. ❤
Excellent Peter!
Thank you. 😊
Great video, do you also have some examquestions that we can study?
Thank you so much. Afraid not as far as exam questions no. You can likely get practice questions from places like Measure Up though.
Does the training integrate with Viva Learning (will I find it under my recommended courses)?
No this is not something that links with Viva Learning - to the best of my knowledge anyway.
to run attack simulations does every user need a defender plan 2 or does the tenant just need one to start the training
You need plan 2 for all the users
Another great video. Keep the good job Peter. You are wonderful.
Thank you very much. 😊
@peter it is very useful learning video,Thanks for it,I have small doubt what is "priority" in policies(for example :threat policies-Lowest,0 are the values shown in this video ),how it works ?can you share some insights about this
Thank you. Yes the priority means that rules / policies are processed starting from 0, then 1, and so on. So there is an order and if users are affected by more than one policy, the lowest number gets done first.
@@peterrisingM365 Thanks for the clarification,in what cases we need to use this priority can you give any examples for this? if possible.
@@prass65prassan In most cases, the lower priority should be the least restrictive settings, and as it progresses through, it builds up to the most restrictive. This is especially true in Purview with Sensitivity labels for example.
❤ thank you ❤
You're welcome 😊
Thank you Peter, I really need this to learn about M365 Defender.
Is it possible to create a test enviroment with "fake" devices that have data in Microsoft Defender?
There are simulations and tutorials in the Defender portal that you may find helpful. They are probably more relevant to Defender for Endpoint though.
When i clicked on the ms-102 study guide it said 404 page not found. do you have an updated link?
Here you go - learn.microsoft.com/en-gb/credentials/certifications/resources/study-guides/ms-102
niceee!
Thank you indeed!
No Microsoft is right they are offenders. As the owner of a company you should be away of who the offenders are when it comes to your company protection. Otherwise great video overall. A lot of valuable information put in a compact presentation give everything that is covered. Added to subscribe for sure!
Thank you so much. 😊
40
40 what? 😂