Chapter 10: Describing Threat Protection with Microsoft 365 Defender
In the previous chapter, we covered how to manage the protection of resources within Azure through Cloud Security Posture Management (CSPM) within Microsoft Defender for Cloud. This included how to use security baselines within Azure to set up the best practice protection for your compute, application, and data resources. In this chapter, we will describe how to manage the protection of Microsoft 365 resources through the extended detection and response (XDR) capabilities of Microsoft 365 Defender.
In this chapter, we're going to cover the following main topics:
- Describing the XDR and Microsoft 365 Defender services
- Describing Microsoft Defender for Office 365
- Describing ...
Get Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.