Chapter 5. Implementing Microsoft Advanced Threat Analytics

Image Scenario requirements for on-premises protection

Image Deploying ATA

Image Setting up the ATA environment

Image Leveraging ATA for threat mitigation and incident response

In Chapter 4, “Introducing Microsoft Advanced Threat Analytics,” you learned how Microsoft Threat Analytics (ATA) can be used to help meet ...

Get Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.