A little secret to rock your YouTube subscribers
Get Free YouTube Subscribers, Views and Likes

Microsoft Defender for Endpoint MDE: Actions taken on a suspicious file in MDE or MS Defender XDR

Follow
CyberPlatter

EDR Interview Questions and Answers:    • EDR Interview Questions and Answers |...  
Response Actions on a Device:    • Microsoft Defender for Endpoint MDE: ...  

Welcome to our series on Microsoft Defender for Endpoint (MDE) an EDR solution, Endpoint Detection and Response. If you're interested in delving deeper into MDE, check out our playlist containing all related videos. This also includes videos on Microsoft Defender XDR. Feel free to suggest any specific topics or tools you'd like us to cover in future episodes.

In this video, we'll walk you through: Response Actions on a File
• What response actions can you take on a file in MDE? What response actions can you take on a file in Microsoft Defender XDR?
○ Stop and quarantine file
○ Download file
○ Collect File
○ Add Indicators Add Indicators of Compromise Manage Indicators
○ Deep Analysis
○ Go hunt
• What actions can you take on a suspicious file in MDE? What actions can you take on a suspicious file in Microsoft Defender XDR?
• How to take actions on a suspicious file in MDE? How to take actions on a suspicious file in Microsoft Defender XDR?

Stay tuned for upcoming videos where we'll explore alternative deployment methods, all of which will be added to the playlist for easy reference.

Microsoft Defender for Endpoint Playlist:    • Microsoft Defender for Endpoint (MDE)  

Cyber Security Interview Questions and Answers:    • CyberSecurity Interview Questions and...  

#CyberPlatter #microsoft #microsoftdefender #xdr #microsoftdefenderXDR #microsoftsecurity #endpointprotection #endpoint #endpoints #endpointsecurity #EDR #xdr

posted by itsallpeeweeqj