Get full access to Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD and 60K+ other titles, with a free 10-day trial of O'Reilly.
There are also live events, courses curated by job role, and more.
Scenario requirements for on-premises protection
Setting up the ATA environment
Leveraging ATA for threat mitigation and incident response
In Chapter 4, “Introducing Microsoft Advanced Threat Analytics,” you learned how Microsoft Threat Analytics (ATA) can be used to help meet ...
Get Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.
Dive in for free with a 10-day trial of the O’Reilly learning platform—then explore all the other resources our members count on to build skills and solve problems every day.