Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 180461517X , 9781804615171
    Language: English
    Pages: 1 online resource
    Edition: 1st edition.
    DDC: 005.8
    Keywords: Microsoft Defender ; Computer networks Security measures
    Abstract: A comprehensive guide to building a deeper understanding of the product, its capabilities, and successful implementation Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand the history of MDE, its capabilities, and how you can keep your organization secure Learn to implement, operationalize, and troubleshoot MDE from both IT and SecOps perspectives Leverage useful commands, tips, tricks, and real-world insights shared by industry experts Book Description With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization. This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you'll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you'll be taken through a day in the life of a security analyst working with the product. You'll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture. By the end of the book, you'll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats. What you will learn Understand the backstory of Microsoft Defender for Endpoint Discover different features, their applicability, and caveats Prepare and plan a rollout within an organization Explore tools and methods to successfully operationalize the product Implement continuous operations and improvement to your security posture Get to grips with the day-to-day of SecOps teams operating the product Deal with common issues using various techniques and tools Uncover commonly used commands, tips, and tricks Who this book is for This book is for cybersecurity professionals and incident responders looking to increase their knowledge of MDE and its underlying components while learning to prepare, deploy, and operationalize the product. A basic understanding of general systems management, administration, endpoint security, security baselines, and basic networking is required.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781803231891
    Language: English
    Pages: 1 online resource (288 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; Electronic books ; Study guides
    Abstract: Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Key Features Detect, protect, investigate, and remediate threats using Microsoft Defender for endpoint Explore multiple tools using the M365 Defender Security Center Get ready to overcome real-world challenges as you prepare to take the SC-200 exam Book Description Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst. Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way. By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam. What you will learn Discover how to secure information technology systems for your organization Manage cross-domain investigations in the Microsoft 365 Defender portal Plan and implement the use of data connectors in Microsoft Defender for Cloud Get to grips with designing and configuring a Microsoft Sentinel workspace Configure SOAR (security orchestration, automation, and response) in Microsoft Sentinel Find out how to use Microsoft Sentinel workbooks to analyze and interpret data Solve mock tests at the end of the book to test your knowledge Who this book is for This book is for security professionals, cloud security engineers, and security analysts who want to learn and explore Microsoft Security Stack. Anyone looking to take the SC-200 exam will also find this guide useful. A basic understanding of Microsoft technologies and security concepts will be beneficial.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...