9

Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint

Devices (especially those connected to the internet) are continuously under attack from malicious actors. These threat actors may attempt to compromise a device or system and use it either to gain access to an environment’s resources or for use as part of a larger system to attack other targets.

Whatever the scenario, Microsoft Defender for Endpoint (MDE) can be used to secure organizations against ransomware, file-less malware, credential compromise, and more advanced attacks.

MDE has several key features, including attack surface reduction (ASR), automatic investigation and remediation (AIR), and endpoint detection and response (EDR). These components, ...

Get Microsoft 365 Administrator MS-102 Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.