Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Defend against cyberthreats with Microsoft Defender XDR

Microsoft via Microsoft Learn

Overview

  • Module 1: Mitigate incidents using Microsoft Defender

    Upon completion of this module, the learner is able to:

    • Manage incidents in Microsoft Defender
    • Investigate incidents in Microsoft Defender
    • Conduct advanced hunting in Microsoft Defender
  • Module 2: Deploy the Microsoft Defender for Endpoint environment

    Upon completion of this module, the learner will be able to:

    • Create a Microsoft Defender for Endpoint environment
    • Onboard devices to be monitored by Microsoft Defender for Endpoint
    • Configure Microsoft Defender for Endpoint environment settings
  • Module 3: Configure for alerts and detections in Microsoft Defender for Endpoint

    After completion of this module, you'll be able to:

    • Configure alert settings in Microsoft Defender for Endpoint
    • Manage indicators in Microsoft Defender for Endpoint
  • Module 4: Configure and manage automation using Microsoft Defender for Endpoint

    Upon completion of this module, the learner will be able to:

    • Configure advanced features of Microsoft Defender for Endpoint
    • Manage automation settings in Microsoft Defender for Endpoint
  • Module 5: Perform device investigations in Microsoft Defender for Endpoint

    Upon completion of this module, the learner is able to:

    • Use the device page in Microsoft Defender for Endpoint
    • Describe device forensics information collected by Microsoft Defender for Endpoint
    • Describe behavioral blocking by Microsoft Defender for Endpoint
  • Module 6: Learn how to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint and onboard devices, configure policies, mitigate threats, and respond to incidents with Defender XDR.

    By the end of this module, you're able to:

    • Configure the Microsoft Defender XDR environment
    • Deploy Microsoft Defender for Endpoint
    • Mitigate threats using Microsoft Defender for Endpoint
    • Investigate and respond to incidents using Microsoft Defender XDR

Syllabus

  • Module 1: Module 1: Mitigate incidents using Microsoft Defender
    • Introduction
    • Use the Microsoft Defender portal
    • Manage incidents
    • Investigate incidents
    • Manage and investigate alerts
    • Manage automated investigations
    • Use the action center
    • Explore advanced hunting
    • Investigate Microsoft Entra sign-in logs
    • Understand Microsoft Secure Score
    • Analyze threat analytics
    • Analyze reports
    • Configure the Microsoft Defender portal
    • Knowledge check
    • Summary and resources
  • Module 2: Module 2: Deploy the Microsoft Defender for Endpoint environment
    • Introduction
    • Create your environment
    • Understand operating systems compatibility and features
    • Onboard devices
    • Manage access
    • Create and manage roles for role-based access control
    • Configure device groups
    • Configure environment advanced features
    • Knowledge check
    • Summary and resources
  • Module 3: Module 3: Configure for alerts and detections in Microsoft Defender for Endpoint
    • Introduction
    • Configure advanced features
    • Configure alert notifications
    • Manage alert suppression
    • Manage indicators
    • Knowledge check
    • Summary and resources
  • Module 4: Module 4: Configure and manage automation using Microsoft Defender for Endpoint
    • Introduction
    • Configure advanced features
    • Manage automation upload and folder settings
    • Configure automated investigation and remediation capabilities
    • Block at risk devices
    • Knowledge check
    • Summary and resources
  • Module 5: Module 5: Perform device investigations in Microsoft Defender for Endpoint
    • Introduction
    • Use the device inventory list
    • Investigate the device
    • Use behavioral blocking
    • Detect devices with device discovery
    • Knowledge check
    • Summary and resources
  • Module 6: Module 6: Defend against Cyberthreats with Microsoft Defender XDR lab exercises
    • Introduction
    • Configure the Microsoft Defender XDR environment
    • Deploy Microsoft Defender for Endpoint
    • Mitigate Attacks with Microsoft Defender for Endpoint
    • Summary

Reviews

Start your review of Defend against cyberthreats with Microsoft Defender XDR

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.