Short & sweet educational videos on Microsoft Defender ATP

Microsoft Defender Advanced Threat Protection is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

Check out these videos Microsoft compiled to help easily discover and learn about Microsoft Defender ATP and drill down into many of its capabilities.

You can find all the latest features and new capabilities here – https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp 

072720_0348_BecomeaMicr1.png

You can access the below MDATP capability videos from this link – https://techcommunity.microsoft.com/t5/microsoft-defender-atp/short-amp-sweet-educational-videos-on-microsoft-defender-atp/ba-p/1021978

New! Overview

 Architecture

This video gives you an all-up overview of Microsoft Defender ATP:

Get a high level understanding of the service architecture:

Onboarding

Role-based access control

Get a quick overview of how easy it is to onboard your endpoints:

See how simple it is to specify granular access control with role-based access control (RBAC):

Threat & Vulnerability Management (TVM) – Overview

Threat & Vulnerability Management – Discovery & Remediation

Get continuous real-time visibility, context-aware prioritization, and a built-in end-to-end remediation process:

See how TVM discovers vulnerabilities and misconfigurations and how you can quickly take action to remediate them in your environment :

New! Attack surface reduction:

Microsoft Defender ATP gives you various tools to eliminate risks by reducing the surface area for attacks without blocking user productivity.

This video is an overview and further down we drill deeper into some of the features with separate videos:

Application control

Network protection

With application control you can control which applications are allowed to run and which are not:

Network protection defends against internet-based attacks by blocking connectivity to a internet destination that is malicious or has a low reputation:  

Reputation analysis – Microsoft Defender SmartScreen

  

Reputation analysis with Microsoft Defender ATP protects users against accessing untrusted websites and running malicious code on their devices:

  

Endpoint detection and response (EDR)

We give you the tools needed to detect and investigate advanced persistent attacks on your network.

Investigation

Advanced hunting

We give you a rich experience for triage and investigations, with all the details needed to easily narrate the end-to-end attack story:

Use advanced hunting to create your own powerful queries and turn them easily into custom detections:

Live response

Deep file analysis

Get real-time live connection to a remote system:

Use the built-in sandbox to detonate suspicious files with a single click and get a detailed and readable report back:

Threat Analytics

Unified IOCs

Assess the impact of threats to your environment and identify actions that can contain them with Threat Analytics:

Upload your own indicators of compromise (IOCs) to also get alerted on your own detection logic:

Automated investigation and remediation

 Microsoft Threat Experts

Enhance your SOC by turning on automated investigation and remediation:

Get an additional layer of oversight and analysis to help ensure that threats don’t get missed:

APIs

Streaming API

Develop Microsoft Defender ATP connected solutions and workflows with a rich set of APIs:

You can use our streaming API to stream event information directly to Azure storage or to Azure Event Hubs:

Conditional access

Security Configuration

Contain a threat by not letting risky devices access your corporate resources through Conditional Access:

See how you can use Microsoft Endpoint Manager to manage security configuration for Microsoft Defender ATP:

Microsoft Cloud App Security (MCAS)

Evaluation Lab

Integrating Microsoft Defender ATP and Microsoft Cloud App Security can help control shadow IT and assist with your security investigations:

The evaluation lab eliminates the complexities of machine & environment configuration – you can focus on evaluating the capabilities right away.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s