Free views, likes and subscribers at YouTube. Now!
Get Free YouTube Subscribers, Views and Likes

Microsoft Defender for Endpoint MDE: Actions taken on a compromised device in MDE or MS Defender XDR

Follow
CyberPlatter

EDR Interview Questions and Answers:    • EDR Interview Questions and Answers |...  
Microsoft Defender for Endpoint (MDE) : Device Discovery:    • Video  
Microsoft Defender for Endpoint MDE: Live Response:    • Video  
Response Actions on a File:    • Microsoft Defender for Endpoint MDE: ...  

Welcome to our series on Microsoft Defender for Endpoint (MDE) an EDR solution, Endpoint Detection and Response. If you're interested in delving deeper into MDE, check out our playlist containing all related videos. This also includes videos on Microsoft Defender XDR. Feel free to suggest any specific topics or tools you'd like us to cover in future episodes.

In this video, we'll walk you through: Response Actions on a Device
• What response actions can you take on a device in MDE? What response actions can you take on a device in Microsoft Defender XDR?
○ How to isolate a device in MDE or Microsoft Defender XDR? Isolate Device
○ How to run an Antivirus scan on a device in MDE or Microsoft Defender XDR? Run Antivirus Scan Quick Scan, Full Scan
○ How to restrict an application from running on a device in MDE or Microsoft Defender XDR? Restrict App Execution
○ How to run an automated investigation on a device in MDE or Microsoft Defender XDR? Initiate Automated Investigation
○ How to connect in realtime to a device in MDE or Microsoft Defender XDR? Initiate Live Response Session
○ How to forcibly release a device from isolation in MDE or Microsoft Defender XDR? Download force release from isolation script
○ How to collect investigation package from a device in MDE or Microsoft Defender XDR? Collect Investigation Package
• What actions can you take on a compromised device in MDE? What actions can you take on a compromised device in Microsoft Defender XDR?
• How to take actions on a compromised device in MDE? How to take actions on a compromised device in Microsoft Defender XDR?

Stay tuned for upcoming videos where we'll explore alternative deployment methods, all of which will be added to the playlist for easy reference.

Microsoft Defender for Endpoint Playlist:    • Microsoft Defender for Endpoint (MDE)  

Cyber Security Interview Questions and Answers:    • CyberSecurity Interview Questions and...  

#CyberPlatter #microsoft #microsoftdefender #xdr #microsoftdefenderXDR #microsoftsecurity #endpointprotection #endpoint #endpoints #endpointsecurity #EDR #xdr

posted by itsallpeeweeqj