Introduction

Completed

Suppose you're the security analyst for a medium-sized organization. You know that threats come in many different forms, for example, many types of attacks utilize compromised credentials. It's essential to protect your organization against these different types of threats. You want to find out whether you can use Microsoft Defender for Identity to detect suspicious activity that might indicate attempts to locate and steal identity information from users, computers, and services running in your network. In this module, you'll learn how to detect and investigate suspicious activities with Microsoft Defender for Identity.

By the end of this module, you should be able to:

  • Understand threat detection in Microsoft Defender for Identity.
  • Understand threat investigation in Microsoft Defender for Identity.