SC 200t00a Enu Powerpoint 03
SC 200t00a Enu Powerpoint 03
SC 200t00a Enu Powerpoint 03
Microsoft Security
Operations Analyst
Author name
Date
3 Explain how Microsoft Defender for Endpoint can remediate risks in your environment
From the Microsoft Defender XDR portal navigation menu, selecting any item
from the Endpoints section, or any feature, will start onboarding.
Windows
2 macOS | Windows 7 SP1 Enterprise (Requires ESU for support.) Windows Server
2008 R2 SP1 (Requires ESU for support) and Above
Linux
3 Linux | support recent versions of the six most common Linux Server distributions:
RHEL 7.2+, CentOS Linux 7.2+, Ubuntu 16 LTS, or higher LTS, SLES 12+, Debian 9+,
and Oracle Linux 7.2.
4 Android
Android
Android 6.0 and higher
5 iOS
iOS
iOS 11.0 and higher.
macOS
© Copyright Microsoft Corporation. All rights reserved.
Manage access
Defender for Endpoint uses the Microsoft Defender XDR Unified role-based access
control (RBAC) model and is designed to give you granular control over what roles can
see, devices they can access, and actions they can take.
Control who can take specific actions: Control who can see information on a
Create custom roles and control what Defender specific device group or groups:
for Endpoint capabilities they can access with Create device groups by specific criteria such as
granularity. names, tags, domains, and others, then grant role
access to them using a specific Entra ID (Security)
user group.
Permission options:
• View data
• Alerts investigation
• Limit access to related alerts and data to specific • Set the automated remediation level for
Entra ID user groups with assigned RBAC roles. that group.
• Configure different auto-remediation settings for • Specify the matching rule that determines which
different sets of devices. device group belongs to the group based on the
device name, domain, tags, and OS platform.
• Assign specific remediation levels to apply during
automated investigations. • Select the Entra ID user group that should have
access to the device group.
• In an investigation, filter the Devices list to just
specific device groups by using the Group filter. • Rank the device group relative to other groups
after it is created.
5 Network protection
Scenario:
You are a Security Operations
Analyst working at a company
that is implementing Microsoft
Defender XDR solutions. You Task 1 Discover devices
need to discover devices in
your on-premise network.
• fileinfo • getfile
• persistence • run
• processes • library
• registry • putfile
• scheduledtasks • remediate
• services
1 IP worldwide
4 IP in organization
5 Prevalence
5 No automated response
1 Turn on the Microsoft Intune connection from Microsoft Defender XDR portal
You can create tuning rules for specific alerts known to be innocuous, such as known
tools or processes in your organization. You can use the examples in the following table
to help you choose the context for a suppression rule:
Inventories Discover and assess all your organization’s assets in a single view.
Weaknesses See the list of common vulnerabilities and exposures (CVEs) in your organization.
Event timeline View events that may impact your organization’s risk.
Baselines assessment Monitor security baseline compliance and identify changes in real-time.
© Copyright Microsoft Corporation. All rights reserved.
Remediation steps
© Copyright Microsoft Corporation. All rights reserved. © Copyright Microsoft Corporation. All rights reserved.
Learning Path Recap
In this learning path, we covered the following topics:
•Defender for Endpoint: Microsoft Defender for Endpoint is a platform designed to help
enterprise networks prevent, detect, investigate, and respond to advanced threats on their
endpoints.
•Threat Management: Defender for Endpoint provides advanced attack detections that are near
real-time and actionable.
•Device Onboarding: Devices can be onboarded to be monitored by Microsoft Defender for
Endpoint through the Defender for Endpoint portal.
•Attack Surface Reduction: Attack surface reduction rules can be enabled on Windows devices
to reduce the attack surface.
•Vulnerability Management: Defender Vulnerability Management uses built-in and agentless
scanners to continuously monitor and detect risk in your organization.
Ask me to help with something else, or for more ideas see the prompt guide below.