Це відео не доступне.
Перепрошуємо.

Set Up Microsoft Defender for Endpoint and Integrate with Defender for Cloud and Intune

Поділитися
Вставка
  • Опубліковано 15 жов 2023
  • Embark on a security fortification journey with Microsoft #Defender for #Endpoint, your robust shield against advanced cyber threats by implementing Azure Security and Endpoint Security. In this episode of AzureVlog, we will delve into the seamless integration of Defender for Endpoint with Defender for #Cloud and Microsoft Intune, elevating your cybersecurity infrastructure to new heights. Discover the intuitive setup process, key features, and the unified security approach that sets Microsoft's #security solutions apart.
    Defender for Cloud will be used for the Defender for endpoint deployment on VMs, Intune will be used for the Defender for endpoint onboarding on endpoint devices. Microsoft Defender for Endpoint is a great tool, part of the Microsoft xdr suite to protect vm’s, servers and endpoints against the latest cyber security threats.
    learn more here:
    learn.microsoft.com/en-us/mic...
    #onboarding #deploymend

КОМЕНТАРІ • 11

  • @patrick__007
    @patrick__007 2 місяці тому

    Just what I needed to onboard my first servers using Defender for Cloud tomorrow.

  • @techtutorialcentral
    @techtutorialcentral 7 місяців тому

    Thank you! Very nice and informative and precise video. This is exactly what I wanted to learn.

  • @sachin-tr4nc
    @sachin-tr4nc 9 місяців тому

    Hi there,
    I hope you are doing great in Life with work to
    You videos are Really Helping me out, I am happy finally got a very Deep knowledgeable Teacher in Azure sentinel Field , I going through you All video lectures & daily I am getting more interest in learning New things from your All videos lectures,
    I have some request for you & please continue uploading more videos on Azure sentinel
    Please Also cover In Below mentioned topics InDetails in Praticaly videos Each
    •)-Logs Analysis(windows, IDS,DNS, HTTP, Firewall & Antivirus Logs)
    •)- Use case creation & How to develop use Use cases
    •)- Fine Tunning use case
    •)-DashBoard & Alert creation
    •)- KQL Queries
    •)-Threat Hunting - Brute Force & SQL Injection Attack
    •)- Incident Response - All steps
    •)- Automation
    Thank in advance and have a great year ahead....

  • @maheshkumarnaik754
    @maheshkumarnaik754 9 місяців тому +1

    Nice sir, Looking for security best practices and how to manage the device using intune

  • @e3tgs
    @e3tgs 5 місяців тому

    Thank you, really inspiring!

  • @junlu3835
    @junlu3835 9 місяців тому

    Nice vedio and coffee as always. ^_^ We have been using MDE for a while, such good integration and protection with Sentinel. Just found that off-board is a little problem, as it requires 180 days of waiting...

  • @ARadicalCut
    @ARadicalCut 7 місяців тому

    In terms of network connectivity i assume that Azure workloads connect to the Defender services over the internet or is there a way to leverage private connectivity?

  • @thirusudhakar1076
    @thirusudhakar1076 9 місяців тому

    Please upload more videos about Microsoft defender for endpoint , TVM, Advanced hunting

  • @sharpshorts4254
    @sharpshorts4254 9 місяців тому

    love your content. cant believe you only have such few subs!!! what certificates have you done for azure etc to get to where you are today?

    • @AzureVlog
      @AzureVlog  9 місяців тому

      Haha! Please reshare the channel so others can benefit from my video's. I started my career as software developer (I am actually educated as software engineer, then moved to the IT pro stuff (Azure Consultancy), and from there to Microsoft Security. I learned al stuff by watching video's on UA-cam, reading a lot of documentation about the products and interaction with the Microsoft program groups.

  • @opeenitan7982
    @opeenitan7982 9 місяців тому

    Can you onboard BYOD to MS defender?