Introduction
Deploying the Microsoft Defender for Endpoint environment involves configuring your tenant, onboarding your devices, and configuring security team access.
You're a Security Operations Analyst working at a company that is implementing Microsoft Defender for Endpoint. Your manager plans to onboard a few devices to provide insight into required changes to the SecOps team response procedures.
You start by initializing the Defender for Endpoint environment—next, you onboard the initial devices for your deployment by running the onboarding script on the devices. You configure security for the environment. Next, you create Device groups and assign the appropriate devices.
After completing this module, you'll be able to:
- Create a Microsoft Defender for Endpoint environment
- Onboard devices to be monitored by Microsoft Defender for Endpoint
- Configure Microsoft Defender for Endpoint environment settings
Prerequisites
Basic understanding of Microsoft 365.