Microsoft Defender for Endpoint | Onboarding Linux Servers

Поділитися
Вставка
  • Опубліковано 7 сер 2024
  • #security #ciso #soc #securityOperationsCenter #microsoft #securityoperations #cybersecurity #security #informationsecurity #datasecurity #infosec #databreach #cyber #cloudsecurity #networksecurity #computersecurity #privacy #ciso #soc #securityOperationsCenter #socanalyst #socasaservice
    Microsoft Defender for Endpoint for Linux
    Microsoft Article - docs.microsoft.com/en-us/micr...
    Microsoft Defender - What is Microsoft Defender for Endpoint? - • Microsoft Defender - W...
    Microsoft Defender for Endpoint Tutorial - • Microsoft Defender for...
    Microsoft Defender for Endpoint - Role based Access Control | SOC Tiering - • Microsoft Defender for...
    Microsoft Defender for Endpoint | RBAC | SOC Tiering | Portal Configuration - • Microsoft Defender for...
    Onboard Windows 10 Devices | Microsoft Defender for Endpoints | MDATP | Local Script - • Onboard Windows Device...
    Onboard Windows Devices | Microsoft Defender for Endpoints | MDATP | Local Script - • Onboard Windows Device...
    Onboard Windows Devices from GPO | Microsoft Defender for Endpoint - • Onboard Windows Device...
    Onboard Windows Devices from MDM | Microsoft Defender for Endpoint - • Onboard Windows Device...
    Microsoft Defender for Endpoint | Onboarding Windows Server 2019 - • Microsoft Defender for...
    Microsoft Defender for Endpoint | Onboarding Windows Server 2016 - • Microsoft Defender for...
    Microsoft Defender for Endpoint | Onboarding Windows Server 2012 R2 - • Microsoft Defender for...
    Microsoft Defender for Endpoint for Linux - • Microsoft Defender for...
    Microsoft Defender for Endpoint | Onboarding Linux Servers - • Microsoft Defender for...
    Detailed Deployment Video | Microsoft Defender For Endpoint - • Detailed Deployment Vi...
    Microsoft Defender for Endpoint | Threat and Vulnerability Management - • Microsoft Defender for...
    Getting Started with Threat and Vulnerability Management | Microsoft defender for Endpoint - • Getting Started with T...
    Threat and Vulnerability Management - Dashboard | Microsoft Defender for Endpoint - • Threat and Vulnerabili...
    Threat and Vulnerability Management - Weaknesses | Microsoft Defender for Endpoint - • Threat and Vulnerabili...
    Security Recommendation and Remediation | Microsoft Defender for Endpoint - • Security Recommendatio...
    Threat and Vulnerability Management - Software Inventory | Microsoft Defender for Endpoint - • Threat and Vulnerabili...
    Microsoft Defender for Endpoint | API | Basics and Fundamentals - • Microsoft Defender for...
    Use postman to access Microsoft Defender for endpoint API - • Use postman to access ...
    Microsoft Defender for Endpoint API | Query Any Entity Set - • Microsoft Defender for...
    Microsoft Defender Application guard | Attack Surface Reduction - • Microsoft Defender App...
    Microsoft Defender Application Guard | Standalone Mode - • Microsoft Defender App...
    Microsoft Defender Application Guard | Enterprise Mode | Capability Showcase - • Microsoft Defender App...
    Microsoft Defender Application Guard | Enterprise Mode | Configuring GPO | Part 1 - • Microsoft Defender App...
    Microsoft Defender Application Guard | Domain Joined Machine - • Microsoft Defender App...
    What is attack surface reduction rule? | Microsoft Defender for Endpoint - • What is attack surface...
    Attack Surface Reduction Rules | Deployment Methods and Modes - • Attack Surface Reducti...
    Attack Surface Reduction | Deployment workflow | Microsoft Defender for Endpoint - • Attack Surface Reducti...
    Configure Attack Surface Reduction rules | PowerShell - • Configure Attack Surfa...
    Configure Attack Surface Reduction Rules | Group Policy - • Configure Attack Surfa...
    Deploy Attack Surface Reduction Rules from Microsoft Intune - • Deploy Attack Surface ...
    Ransomware Protection | Controlled Folder Access | Microsoft Defender for Endpoint - • Ransomware Protection ...
    Ransomware Protection | Configure Controlled folder Access | Microsoft defender for Endpoint - • Ransomware Protection ...
    Ransomware Protection | Enable Controlled Folder Access from Group Policy Object |Microsoft Defender - • Ransomware Protection ...
    Ransomware Protection | Enable Controlled Folder Access from Microsoft Intune | Microsoft Defender - • Ransomware Protection ...
  • Наука та технологія

КОМЕНТАРІ • 25

  • @jefff502
    @jefff502 2 роки тому +1

    Thanks for publishing this excellent video, made onboarding my Linux Servers a breeze, MUCH appreciated!

  • @tomasmulugeta2662
    @tomasmulugeta2662 2 роки тому

    This is one of the most informative vedio i have ever seen. thank you for that.

  • @iangibson2439
    @iangibson2439 Рік тому

    Awesome video. Thank you so much. I struggled yesterday to do this and spent a lot of time without success. Watching this video and I managed to oboard succesfully in about 5 minutes. Very clear and precise instructions. Well done: :) !

  • @Delta-V1
    @Delta-V1 Рік тому

    One of the best masters in Azure and security. thanks

  • @maximumsilver2992
    @maximumsilver2992 Місяць тому

    THANK YOU!!!!

  • @user-fh6wm2cs2j
    @user-fh6wm2cs2j 5 місяців тому

    Muy buen video, me ayudo demasiado con el trabajo que necesitaba hacer
    todo funciona perfecto

  • @its_Tricky83
    @its_Tricky83 Рік тому

    Thanks for making life so much easier!

    • @ConceptsWork
      @ConceptsWork  Рік тому

      Happy to help! Thank you for your kind acknowledgement.

  • @ashu-r808k
    @ashu-r808k 4 місяці тому

    I have reviewed our mdatp check and identified some missing items. Could you please add them? Additionally, it would be helpful if you could create a shell script for all the commands. This would greatly assist in managing a large network and benefit many people. Thank you!

  • @FliskerX
    @FliskerX 2 роки тому +1

    12:55 Problem I run into is that, in this console, the "Exposure level" is not getting populated ever, no security info, no vulnerability management info, it's just showing logs on timeline. But mdatp health command shows that everything should be ok, connection test runs correctly too. Any ideas what's wrong ? It's the same on Debian and on SUSE. And I can't find method to test if alerts are even working.

  • @riadoszh6616
    @riadoszh6616 10 місяців тому

    great content! thanks.keep going !!! is there any solutions to onboard linux server through proxy server to send only telemetry microsoft defender ??

  • @its_Tricky83
    @its_Tricky83 Рік тому +1

    Awesome video! ⭐⭐⭐⭐⭐

  • @honestsniping1
    @honestsniping1 Рік тому

    Is it correct that there are only amd64 packaged for mdatp and none for arm?

  • @lucasgaldino9678
    @lucasgaldino9678 2 роки тому

    ❤️

  • @sandeepkumar-pl6ts
    @sandeepkumar-pl6ts Рік тому

    excellent video, thank you...is there any way we can perform GUI steps in command line?

  • @Samcasm7
    @Samcasm7 Рік тому

    Can you please make the or provide the installation steps of the same on Redhat and suse machines ?

    • @ConceptsWork
      @ConceptsWork  Рік тому +1

      Will share one for red hat versions as well.

  • @juancarlosvillalbacardenas2499
    @juancarlosvillalbacardenas2499 10 місяців тому

    Where are file py?

    • @ConceptsWork
      @ConceptsWork  10 місяців тому

      I hope you are referring to onboarding script, it has to be downloded from security portal.

  • @ShankarDada010
    @ShankarDada010 10 місяців тому

    U said linux and doing on ubuntu

    • @ConceptsWork
      @ConceptsWork  10 місяців тому

      What is Linux?
      Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.
      What is ubuntu?
      Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software.
      Microsoft Official Documentation
      learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/linux-install-manually?view=o365-worldwide
      Ubuntu Specific Section
      learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/linux-install-manually?view=o365-worldwide#ubuntu-and-debian-systems
      Reason for doing ubuntu - It's slightly more relatable, as there are some operations I was doing through GUI.
      Title of video :- Onboarding Linux servers.
      Since the underlying services are same.
      ubuntu server - ubuntu.com/download/server
      Important Note: - There is just one single python script available on MDE portal, to get all the supported linux distributions onboarded.
      Happy Learning.