New Skills

New Training: Manage Security Reports and Alerts

by Team Nuggets
New Training: Manage Information Governance picture: A
Published on March 3, 2021

In this 6-video skill, CBT Nuggets trainer John Munjoma covers planning and implementing threat protection with Microsoft Defender. Watch this new Microsoft 365 training.

Learn Microsoft 365 with one of these courses:

This training includes:

  • 6 videos

  • 45 minutes of training

You’ll learn these topics in this skill:

  • Working With Secure Score

  • Managing Cloud App Security Alerts

  • Managing Office 365 Security Alerts

  • Incident Management and Investigation

  • Configuring ATP Policies

  • Configuring External Mail Tip

Deploying Microsoft Defender for the Business Environment

Microsoft Defender is not just a general antivirus application for consumers anymore. It has developed into a full threat protection suite. The Microsoft Defender Suite now offers on-computer antivirus and malware protection, full endpoint protection, Office 365 protection, Azure APT protection, and more.

Before deploying Microsoft Defender, IT professionals will need to plan appropriately. Depending on the IT infrastructure, Microsoft Defender can be deployed in a few different ways.

For instance, Defender can be deployed as a cloud-native solution, an on-premise solution, or a combination of both. Systems administrators will want to use the deployment method that best fits their current IT structure. Defender also includes an evaluation and local onboarding process as well.

Defender can be deployed to endpoints through a variety of mechanisms as well. For instance, a small business may choose to use a local script for installation and configuration. This method is suitable for 10 devices or less. Defender can also be deployed through group policy or the Microsoft Endpoint Manager cloud dashboard.

Defender includes a variety of protection methods that need to be configured, too. The protection suite includes endpoint detection and response, a next-generation protection feature set, and attack surface reduction suite. Not all businesses need every feature Defender offers, so IT professionals will need to research which options they need.



Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

Don't Miss Out

Get great content delivered to your inbox.

I have read and understood the privacy policy, and am able to consent to it.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2022 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522