Microsoft 365 Threat Intelligence

A Part of MD - 101.

Beginner 4(1 Ratings)
English
What will you learn?
  • Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph
  • Describe how the threat dashboard can benefit C-level security officers
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
  • Describe what Advanced Thread Analytics (ATA) is and what requirements are needed to deploy it
  • Configure Advanced Threat Analytics
  • Manage the ATA services
  • Explain how to deploy Cloud App Security

Live training
  • Date : July 07, 2021
  • Time (GMT) : 14:00:00
  • Time (EST) : 09:00:00
  • Duration : 120 Minutes
Prerequisites
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.
Description

This session is a part of MD - 101. In this, you will study about how the world of data has evolved and how cloud data platform technologies are providing new opportunities for businesses to explore their data in different ways. You will gain an overview of the various data platform technologies that are available and how a Data Engineer's role and responsibilities has evolved to work in this new world to an organization's benefit.

Framework

Microsoft 365 Threat Intelligence

  • Overview of Microsoft 365 Threat Intelligence.
  • Using the Security Dashboard.
  • Configuring Advanced Threat Analytics.
  • Implementing Your Cloud Application Security.

Demo: Implement Threat Intelligence

  • Conduct a Spear Phishing attack using the Attack Simulator.
  • Conduct Password attacks using the Attack Simulator.
  • Prepare for Alert Policies.
  • Implement a Mailbox Permission Alert.
  • Implement a SharePoint Permission Alert.
  • Test the Default eDiscovery Alert.

Benefits

  • Track and respond to today’s most serious threats, in real-time, in one place.
  • Retain high-value data, ensure business continuity, and reduce risk.
  • Proactively detect advanced attacks before they reach the organization.
  • Systematically help protect the organization with dynamic policy recommendations.
  • Take action on malware threats in real time.
  • Gain visibility into top targeted users.
  • Use dashboard components that range from global trends to investigation starting points.
  • Get greater visibility into indicators of compromise and the cyberthreat landscape.
  • Perform detailed investigations to precisely target the emails, users, and machines that were affected.
  • More quickly detect and investigate threats, and respond with greater speed and efficiency to contain threats—in minutes instead of hours or days.


+ View more
Other related courses
Student feedback
4
Average rating
  • 0%
  • 0%
  • 0%
  • 100%
  • 0%
$7
Buy now
Includes:
  • Learn from Industry Experts
  • Ask Question to Trainer
  • 100% Online Courses
  • Certificate of Completion