Defend against cyberthreats with Microsoft Defender XDR
At a glance
-
Level
-
Skill
-
Subject
Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.
Note
You'll need to have access to a Microsoft 365 E5 Tenant with a Microsoft Defender for Endpoint P2 license to perform the exercises.
Prerequisites
- Experience using the Microsoft Defender portal
- Basic understanding of Microsoft Defender for Endpoint
- Basic understanding of Microsoft Sentinel
- Experience using Kusto Query Language (KQL) in Microsoft Sentinel
Achievement Code
Would you like to request an achievement code?
Modules in this learning path
Learn how the Microsoft Defender portal provides a unified view of incidents from the Microsoft Defender family of products.
Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security.
Learn how to configure settings to manage alerts and notifications. You'll also learn to enable indicators as part of the detection process.
Learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings.
Microsoft Defender for Endpoint provides detailed device information, including forensics information. Learn about information available to you through Microsoft Defender for Endpoint that aids in your investigations.
In this module, you learned how to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint, and onboard devices. You also configured policies, mitigated threats and responded to incidents with Defender XDR.