LP1 - Overview of Microsoft 365 Defender
Cyber security attacks
- Zero Trust model
- MITRE ATT&CK framework
- Example attack chain
Microsoft 365 Defender services
- Services overview
- License requirements
- Administration
- Microsoft Secure Score
Labs
Review
LP2 - Configuring Defender for Office 365
Threats and protection
- Protection against known threats
- Email authentication to prevent spoofing
- Protection against unknown threats
Defender for Office 365 policies
- Policies and recommended settings
- Managing the quarantine
- Advanced delivery policies
Attack simulation training
- Types of simulation
- Create and run a simulation
Labs
Review
LP3 - Deploying and configuring Defender for Endpoint
Exploring the service
- Capabilities
- Defender Vulnerability Management
Deployment
- General settings
- Permissions
- Onboarding
Evaluation lab
Protecting endpoints
- Next-generation protection
- Attack surface reduction
Labs
Review
LP4 - Deploying Defender for Identity
Deploying the sensor
- Creating the service accounts
- Installing the sensor
- Entity tags
Identity security posture
- Assessments
- Securing accounts
- Securing authentication protocols
Lab
Review
LP5 - Configuring Defender for Cloud Apps
Connecting to apps and logs
- Connecting to Office 365
- Cloud Discovery
- Admin roles
Threat detection policies
- Importing user groups
- Creating policies
Labs
Review
LP6 - Investigating and responding to threats
Responding to incidents
- Managing incidents
- Remediate
- Automated investigation and response
Advanced hunting
- Creating queries
- Kusto query language (KQL)
Labs
Review