Skip to content

Commit 3389eb7

Browse files
authored
pull base content,head:MicrosoftDocs:main,into:wwlpublishsync
2 parents 0986a6d + c4e098e commit 3389eb7

12 files changed

+169
-0
lines changed
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.defend-against-cyberthreats-microsoft-defender-xdr-labs.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: "Introduction to the Defend against Cyberthreats with Microsoft Defender XDR exercises module."
7+
ms.date: 11/7/2024
8+
author: wwlpublish
9+
ms.author: kelawson
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.defend-against-cyberthreats-microsoft-defender-xdr-lab.initialize-defender-xdr-exercise
3+
4+
title: Configure the Microsoft Defender XDR environment
5+
metadata:
6+
title: exercise
7+
description: "Configure the Microsoft Defender XDR environment."
8+
ms.date: 11/7/2024
9+
author: wwlpublish
10+
ms.author: kelawson
11+
ms.topic: unit
12+
durationInMinutes: 10
13+
content: |
14+
[!include[](includes/2-initialize-defender-xdr-exercise.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.defend-against-cyberthreats-microsoft-defender-xdr-lab.deploy-defender-endpoint-exercise
3+
4+
title: Deploy Microsoft Defender for Endpoint
5+
metadata:
6+
title: exercise
7+
description: "Deploy Microsoft Defender for Endpoint and onboard devices."
8+
ms.date: 11/7/2024
9+
author: wwlpublish
10+
ms.author: kelawson
11+
ms.topic: unit
12+
durationInMinutes: 15
13+
content: |
14+
[!include[](includes/3-deploy-defender-endpoint-exercise.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.defend-against-cyberthreats-microsoft-defender-xdr-lab.incidents-exercise
3+
4+
title: Mitigate Attacks with Microsoft Defender for Endpoint
5+
metadata:
6+
title: exercise
7+
description: "Mitigate Attacks with Microsoft Defender for Endpoint."
8+
ms.date: 11/7/2024
9+
author: wwlpublish
10+
ms.author: kelawson
11+
ms.topic: unit
12+
durationInMinutes: 30
13+
content: |
14+
[!include[](includes/4-incidents-exercise.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.defend-against-cyberthreats-microsoft-defender-xdr-labs.summary
3+
title: Summary
4+
metadata:
5+
title: summary
6+
description: "Provides a summary of initializing and deploying Microsoft Defender XDR and Microsoft Defender for Endpoint."
7+
ms.date: 11/5/2024
8+
author: wwlpublish
9+
ms.author: kelawson
10+
ms.topic: unit
11+
durationInMinutes: 5
12+
content: |
13+
[!include[](includes/5-summary.md)]
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
Defending against cyberthreats with Microsoft Defender involves provisioning and deploying Defender XDR (Extended Detection and Response) and Defender for Endpoint before you can onboard devices, configure policies, and investigate and respond to incidents.
2+
3+
You're a Security Operations Analyst working at a company that is implementing Microsoft Defender. Your role is to
4+
guide the company’s IT team to defend against cyberthreats with Microsoft Defender (XDR).
5+
6+
After completing this module, you'll be able to:
7+
8+
- Configure the Microsoft Defender XDR environment
9+
- Deploy Microsoft Defender for Endpoint
10+
- Mitigate threats using Microsoft Defender for Endpoint
11+
- Investigate and respond to incidents using Microsoft Defender XDR
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
Now it's your chance to deploy and configure a Microsoft Defender workspace.
2+
3+
In this exercise, you learn how to deploy and configure the Microsoft Defender XDR workspace.
4+
5+
> [!NOTE]
6+
> To complete this exercise, you will need access to a Microsoft 365 E5 [free trial subscription](/microsoft-365/commerce/try-or-buy-microsoft-365?view=o365-worldwide&preserve-view=true).
7+
8+
Launch the exercise and follow the instructions.
9+
10+
[![Button to launch exercise.](../media/launch-exercise.png)](https://microsoftlearning.github.io/Defend-against-cyberthreats-Microsoft-Defender-XDR/Instructions/Labs/LAB_01_Configure_Microsoft_Defender.html)
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
Now it's your chance to deploy and configure Microsoft Defender for Endpoint.
2+
3+
In this exercise, you learn how to initialize a Microsoft Defender for Endpoint environment, and onboard devices.
4+
5+
> [!NOTE]
6+
> To complete this exercise, you will need access to a Microsoft 365 E5 [free trial subscription](/microsoft-365/commerce/try-or-buy-microsoft-365?view=o365-worldwide&preserve-view=true), and a Microsoft Defender for Endpoint P2 [free trial subscription](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us).
7+
8+
Launch the exercise and follow the instructions.
9+
10+
[![Button to launch exercise.](../media/launch-exercise.png)](https://microsoftlearning.github.io/Defend-against-cyberthreats-Microsoft-Defender-XDR/Instructions/Labs/LAB_02_Deploy_Defender_Endpoint.html)
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
Now it's time to validate your configuration by performing simulated attacks that generate alerts and incidents.
2+
3+
In this exercise, you explore the Microsoft Defender for Endpoint attack mitigation capabilities. And, you verify successful device onboarding and investigate alerts and incidents created during that process.
4+
5+
> [!NOTE]
6+
> To complete this exercise, you will need access to a Microsoft 365 E5 [free trial subscription](/microsoft-365/commerce/try-or-buy-microsoft-365?view=o365-worldwide&preserve-view=true), and a Microsoft Defender for Endpoint P2 [free trial subscription](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us).
7+
8+
Launch the exercise and follow the instructions.
9+
10+
[![Button to launch exercise.](../media/launch-exercise.png)](https://microsoftlearning.github.io/Defend-against-cyberthreats-Microsoft-Defender-XDR/Instructions/Labs/LAB_03_Mitigate_Attacks.html)
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
In this module you learned how to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint and onboard devices. You also configured policies, mitigated threats and responded to alerts and incidents with Defender XDR.
2+
3+
You should now be able to:
4+
5+
- Configure the Microsoft Defender XDR environment
6+
- Deploy Microsoft Defender for Endpoint and onboard devices
7+
- Mitigate threats using Microsoft Defender for Endpoint device groups and security policies
8+
- Investigate and respond to incidents using Microsoft Defender XDR
9+
10+
## Learn more
11+
12+
You can learn more by reviewing the following.
13+
14+
- [What is Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)
15+
16+
- [What is Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
17+
18+
- [Microsoft Tech Community Security Webinars](https://techcommunity.microsoft.com/t5/microsoft-security-and/security-community-webinars/ba-p/927888?azure-portal=true)

0 commit comments

Comments
 (0)