New Skills

New Training: Manage Security Reports and Alerts

by Team Nuggets
New Training: Manage Information Governance picture: A
Published on March 3, 2021

In this 6-video skill, CBT Nuggets trainer John Munjoma covers planning and implementing threat protection with Microsoft Defender. Watch this new Microsoft 365 training.

Learn Microsoft 365 with one of these courses:

This training includes:

  • 6 videos

  • 45 minutes of training

You’ll learn these topics in this skill:

  • Working With Secure Score

  • Managing Cloud App Security Alerts

  • Managing Office 365 Security Alerts

  • Incident Management and Investigation

  • Configuring ATP Policies

  • Configuring External Mail Tip

Deploying Microsoft Defender for the Business Environment

Microsoft Defender is not just a general antivirus application for consumers anymore. It has developed into a full threat protection suite. The Microsoft Defender Suite now offers on-computer antivirus and malware protection, full endpoint protection, Office 365 protection, Azure APT protection, and more.

Before deploying Microsoft Defender, IT professionals will need to plan appropriately. Depending on the IT infrastructure, Microsoft Defender can be deployed in a few different ways.

For instance, Defender can be deployed as a cloud-native solution, an on-premise solution, or a combination of both. Systems administrators will want to use the deployment method that best fits their current IT structure. Defender also includes an evaluation and local onboarding process as well.

Defender can be deployed to endpoints through a variety of mechanisms as well. For instance, a small business may choose to use a local script for installation and configuration. This method is suitable for 10 devices or less. Defender can also be deployed through group policy or the Microsoft Endpoint Manager cloud dashboard.

Defender includes a variety of protection methods that need to be configured, too. The protection suite includes endpoint detection and response, a next-generation protection feature set, and attack surface reduction suite. Not all businesses need every feature Defender offers, so IT professionals will need to research which options they need.

Recommended Articles