3
The Fundamentals of Microsoft Defender for Endpoint
We’ll begin our journey of deploying and configuring Microsoft Defender for Endpoint (MDE) by exploring its fundamentals. Why is a full chapter dedicated to this? Well, it’s complicated. No, really, it is! MDE’s complexity is a result of its far-reaching scope of different security capabilities, its support for a diverse set of OSs, and the ability for us to manage its features from different administrative systems.
In this chapter, you will learn important background knowledge about MDE. By learning the fundamentals, you will be able to understand the terminology and architectural options, and you will be braced for the inevitable changes of a cloud-based service. This chapter should be ...
Get Mastering Microsoft 365 Defender now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.