Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1023205%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1023205%22%20slang%3D%22en-US%22%3E%3CP%3EAwesome%20job%20team!!%20All%20the%20videos%20are%20great!!%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fstareyes_40x40.gif%22%20alt%3D%22%3Astareyes%3A%22%20title%3D%22%3Astareyes%3A%22%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1027149%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1027149%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F63582%22%20target%3D%22_blank%22%3E%40Heike%20Ritter%3C%2FA%3E%2C%26nbsp%3Bfor%20these%20videos.%26nbsp%3B%20I%20also%20bookmarked%20the%20article%20to%20come%20back%20to%20them%20when%20need%20be.%26nbsp%3B%20We%20are%20just%20in%20the%20process%20of%20going%20from%20O365%20E5%20to%20M365%20E5.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1045563%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1045563%22%20slang%3D%22en-US%22%3E%3CP%3ELove%20these%20videos.%20Thanks%2C%20Heike!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1066627%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1066627%22%20slang%3D%22en-US%22%3EHi%2C%20I%20think%20there%20is%20some%20good%20improvements%20that%20could%20be%20made%20to%20RBAC%3A%201.%20Limit%20what%20can%20be%20viewed%2C%20e.g.%20timeline%20is%20not%20suitable%20for%20GDPR%20in%20Europe%20or%20will%20not%20sit%20well%20with%20unions.%202.%20Tag's%20should%20be%20able%20to%20be%20applied%20in%20automated%20fashions%20like%20Machine%20groups.%20Sometimes%20you%20will%20want%20to%20link%20an%20action%20to%20a%20tag.%20Such%20as%20apply%20web%20filtering%20for%20different%20regions%20and%20groups%20of%20people.%20In%20some%20cases%20this%20would%20help%20whereby%20you%20base%20it%20on%20the%20tag%20rather%20than%20the%20machine%20group%20otherwise%20with%20only%20being%20a%20member%20of%20one%20machine%20group%20you%20can%20loose%20the%20functionality%20you%20would%20expect.%20Something%20else%20slightly%20related%20is%20that%20if%20you%20use%20SCEP%20with%20Win%207%20it%20seems%20like%20ATP%20can%20read%20what%20happens%20on%20the%20OS%20but%20will%20not%20report%20a%20virus%20even%20if%20it%20is%20detected%20on%20the%20endpoint.%20It%20will%20however%20pick%20up%20powershell%20examples%20at%20least%20but%20won't%20pull%20any%20logs.%20Since%20Windows%207%20is%20around%20for%20another%203%20years%20is%20it%20not%20important%20to%20add%20some%20of%20the%20basic%20level%20features%3F%20i.e.%20Scan%2C%20collect%20logs%2C%20check%20definitions%20are%20in%20date%2C%20submit%20samples%20and%20isolation%20(could%20be%20done%20with%20some%20firewall%20rules).%20I%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1066629%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1066629%22%20slang%3D%22en-US%22%3Ep.s.%20great%20videos%20in%20general%20though%20%3A)%3C%2Fimg%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1148481%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1148481%22%20slang%3D%22en-US%22%3E%3CP%3EVideo%20is%20normally%20my%20least-favorite%20learning%20method%20-%20too%20time%20consuming.%20But%20these%20videos%20are%20great%20-%20short%20and%20to%20the%20point.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1212691%22%20slang%3D%22en-US%22%3ERe%3A%20Short%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1212691%22%20slang%3D%22en-US%22%3E%3CP%3EThese%20are%20really%20great%20resources.%20Thanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F63582%22%20target%3D%22_blank%22%3E%40Heike%20Ritter%3C%2FA%3E%26nbsp%3Band%20team!%20%3Asmiling_face_with_smiling_eyes%3A%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1021978%22%20slang%3D%22en-US%22%3EShort%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1021978%22%20slang%3D%22en-US%22%3E%3CP%3EDelivering%20on%20our%20mission%20to%20help%20customers%20take%20full%20advantage%20of%20Microsoft%20Defender%20ATP%20capabilities%2C%20we're%20continuously%20adding%20new%20features%20to%20the%20platform.%3C%2FP%3E%0A%3CP%3ECheck%20out%20these%20videos%20we've%20compiled%20to%20help%20customers%20easily%20discover%20and%20learn%20about%20Microsoft%20Defender%20ATP%2C%20and%20drill%20down%20into%20many%20of%20it's%20capabilities.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe've%20just%20added%20brand-new%20videos%20-%20tagged%20with%20%22%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%3C%2FSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3E%3CFONT%20color%3D%22%23000000%22%3E%22.%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe'd%20also%20love%20to%20hear%20from%20you%20what%20other%20videos%20YOU%20would%20like%20to%20see%20(in%20case%20we%20missed%20them%20on%20our%20list.%20%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fsmile_40x40.gif%22%20alt%3D%22%3Asmile%3A%22%20title%3D%22%3Asmile%3A%22%20%2F%3E).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20width%3D%22722px%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EOnboarding%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3ERole-based%20access%20control%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22269px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EGet%20a%20quick%20overview%20of%20how%20easy%20it%20is%20to%20onboard%20your%20endpoints%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4bGqr%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22269px%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3ESee%20how%20simple%20it%20is%20to%20specify%20granular%20access%20control%20with%20role-based%20access%20control%20(RBAC)%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4bJ2a%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2256px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Threat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%20-%20Overview%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2256px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Threat%20%26amp%3B%20Vulnerability%20Management%20-%20Discovery%20%26amp%3B%26nbsp%3B%3C%2FSTRONG%3E%3C%2FFONT%3E%3CSPAN%20style%3D%22background-color%3A%20transparent%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3ERemediation%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22297px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EGet%20continuous%20real-time%20visibility%2C%20context-aware%20prioritization%20and%20a%20built-in%20end-to-end%20remediation%20process%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4r1nv%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22297px%22%20style%3D%22width%3A%20362.9px%3B%22%3ESee%20how%20TVM%20discovers%20vulnerabilities%20%26amp%3B%20misconfigurations%20and%20how%20you%20can%20quickly%20take%20action%20to%20remediate%20them%20in%20your%20environment%20%3A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qLVs%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20colspan%3D%222%22%20width%3D%22721.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Attack%20Surface%20Reduction%3A%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20colspan%3D%222%22%20width%3D%22721.333px%22%20height%3D%2256px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23000000%22%3E%20Microsoft%20Defender%20ATP%26nbsp%3Bgives%20you%20various%26nbsp%3Btools%20to%20eliminate%20risks%20by%20reducing%20the%20surface%20area%20of%20attack%2C%20without%20blocking%20users%20productivity.%3C%2FFONT%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Application%20control%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Network%20protection%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22324px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CSPAN%3EWith%26nbsp%3BApplication%20control%20you%20can%20control%20which%20applications%20are%20allowed%20to%20run%20and%20which%20are%20not.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qZ0c%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22324px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3ENetwork%20protection%20defends%20against%20Internet-based%20attacks%20by%20blocking%20connectivity%20to%20a%20internet%20destination%20that%20is%20malicious%20or%20has%20a%20low%20reputation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4r4yZ%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Reputation%20Analysis%20-%20SmartScreen%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22324px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EReputation%20analysis%20with%20Microsoft%20Defender%20ATP%20protects%20users%20against%20accessing%20untrusted%20websites%20and%20running%20malicious%20code%20on%20their%20devices.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4r1mV%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22324px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20colspan%3D%222%22%20width%3D%22721.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EEndpoint%20Detection%20%26amp%3B%20Response%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20colspan%3D%222%22%20width%3D%22721.333px%22%20height%3D%2229px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23000000%22%3EWe%20give%20you%20the%20tools%20needed%20to%20detect%20and%20investigate%20advanced%20persistent%20attacks%20on%20your%20network%3C%2FFONT%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Investigation%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EAdvanced%20hunting%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22297px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3ETo%20triage%20%26amp%3B%20investigate%20we%20give%20you%20a%20rich%20experience%20with%20all%20the%20details%20needed%20to%20easily%20narrate%20the%20end-to-end%20attack%20story.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qLUV%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22297px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EUse%20advanced%20hunting%20to%20create%20your%20own%20powerful%20queries%20and%20turn%20them%20easily%20into%20custom%20detections%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4bGqo%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Live%20response%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EDeep%20file%20analysis%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22269px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EGet%20a%20real-time%20live%20connection%20to%20a%20remote%20system.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qLUW%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22269px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EUse%20the%20built-in%20sandbox%20to%20detonate%20suspicious%20files%20with%20a%20single%20click%20and%20get%20a%20detailed%20%26amp%3B%20readable%20report%20back.%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4aAYy%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EThreat%20Analytics%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Unified%20IOCs%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22297px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EAssess%20the%20impact%20of%20threats%20to%20your%20environment%20and%20identify%20actions%20that%20can%20contain%20them%20with%20Threat%20Analytics.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4bw1f%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%20data-mce-fragment%3D%221%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22297px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EUpload%20your%20own%20Indicators%20of%20Compromise%20(IOCs)%20to%20also%20get%20alerted%20on%20your%20own%20detection%20logic.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qLVw%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%20data-mce-fragment%3D%221%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EAutomated%20investigation%20and%20remediation%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%26nbsp%3B%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Microsoft%20Threat%20Experts%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22297px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EEnhance%20your%20SOC%20by%20turning%20on%20automated%20investigation%20and%20remediation%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4bOeh%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22297px%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3EGet%20an%20additional%20layer%20of%20oversight%20and%20analysis%20to%20help%20ensure%20that%20threats%20don%E2%80%99t%20get%20missed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qZ0B%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EAPIs%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Streaming%20API%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22269px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EDevelop%20Microsoft%20Defender%20ATP%20connected%20solutions%20and%20workflows%20with%20a%20rich%20set%20of%20APIs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4d73M%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22269px%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3EYou%20can%20use%20our%20streaming%20API%20to%20stream%20event%20information%20directly%20to%20Azure%20storage%20or%20to%20Azure%20Event%20Hubs.%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4r4ga%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23ffffff%22%3E%3CSTRONG%3EConditional%20access%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Security%20Configuration%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%22269px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3EContain%20a%20threat%20by%20not%20letting%20risky%20devices%20access%20your%20corporate%20resources%2C%20and%20configure%20Microsoft%20Conditional%20Access%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4byD1%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%22269px%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3ESee%20how%20to%20can%20use%20Microsoft%20Endpoint%20Manager%20to%20manage%20security%20configuration%20for%20Microsoft%20Defender%20Advanced%20Threat%20Protection.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qLVq%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Evaluation%20Lab%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20bgcolor%3D%22%232f5496%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CFONT%20color%3D%22%2300FF00%22%3ENew!%3C%2FFONT%3E%20Microsoft%20Cloud%20App%20Security%20(MCAS)%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22359.333px%22%20height%3D%2229px%22%20style%3D%22width%3A%20360.9px%3B%22%3E%3CP%3ESkip%20the%20complex%20proof-of-concept%20configuration%20and%20jump%20right%20into%20attack%20simulations%20by%20using%20the%20Evaluation%20Lab.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4qLUM%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22362px%22%20height%3D%2229px%22%20style%3D%22width%3A%20362.9px%3B%22%3E%3CP%3EIntegrating%20Microsoft%20Defender%20ATP%20and%20Microsoft%20Cloud%20App%20Security%20can%20help%20control%20shadow%20IT%20and%20assist%20with%20your%20security%20investigations.%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4r4yQ%3Frel%3D0%22%20width%3D%22400%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20want%20to%20stay%20updated%20about%20Microsoft%20Defender%20ATP%2C%20you%20can%20follow%20our%20Twitter%20accounts%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22clipboard_image_1.png%22%20style%3D%22width%3A%2038px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F158116i1F6BAE5F103AF529%2Fimage-dimensions%2F38x33%3Fv%3D1.0%22%20width%3D%2238%22%20height%3D%2233%22%20title%3D%22clipboard_image_1.png%22%20alt%3D%22clipboard_image_1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2FWindowsATP%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Defender%20ATP%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22clipboard_image_2.png%22%20style%3D%22width%3A%2037px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F158117i35D066951B47F34E%2Fimage-dimensions%2F37x28%3Fv%3D1.0%22%20width%3D%2237%22%20height%3D%2228%22%20title%3D%22clipboard_image_2.png%22%20alt%3D%22clipboard_image_2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fheikeritter%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHeike%20Ritter%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1021978%22%20slang%3D%22en-US%22%3E%3CP%3ECheck%20out%20these%20videos%20we've%20recorded%20to%20help%20you%20easily%20discover%20and%20learn%20about%20Microsoft%20Defender%20ATP%20and%20about%20many%20of%20it's%20capabilities.%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22video-teaser-pic.PNG%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F158127i2924B1D779CEA4FA%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20title%3D%22video-teaser-pic.PNG%22%20alt%3D%22video-teaser-pic.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Delivering on our mission to help customers take full advantage of Microsoft Defender ATP capabilities, we're continuously adding new features to the platform.

 

Check out these videos we've compiled to help customers easily discover and learn about Microsoft Defender ATP and drill down into many of its capabilities. 

 

We'd also love to hear from you what other videos YOU would like to see (in case we missed them on this list. :smile:).

 

New! Overview

 Architecture

This video gives you an all-up overview of Microsoft Defender ATP:

Get a high level understanding of the service architecture:


Onboarding

Role-based access control

Get a quick overview of how easy it is to onboard your endpoints:

 

 

See how simple it is to specify granular access control with role-based access control (RBAC):

 

 

Threat & Vulnerability Management (TVM) - Overview

Threat & Vulnerability Management - Discovery & Remediation

Get continuous real-time visibility, context-aware prioritization, and a built-in end-to-end remediation process:

 

 

See how TVM discovers vulnerabilities and misconfigurations and how you can quickly take action to remediate them in your environment :

 

 

New! Attack surface reduction:

Microsoft Defender ATP gives you various tools to eliminate risks by reducing the surface area for attacks without blocking user productivity.

This video is an overview and further down we drill deeper into some of the features with separate videos:

 

Application control

Network protection

With application control you can control which applications are allowed to run and which are not:

 

 

 

Network protection defends against internet-based attacks by blocking connectivity to a internet destination that is malicious or has a low reputation:

 

 

Reputation analysis - Microsoft Defender SmartScreen

 

Reputation analysis with Microsoft Defender ATP protects users against accessing untrusted websites and running malicious code on their devices:

 

Endpoint detection and response (EDR)

We give you the tools needed to detect and investigate advanced persistent attacks on your network.
Investigation Advanced hunting

We give you a rich experience for triage and investigations, with all the details needed to easily narrate the end-to-end attack story:

 

 

Use advanced hunting to create your own powerful queries and turn them easily into custom detections:

 

 

Live response Deep file analysis

Get real-time live connection to a remote system:

 

Use the built-in sandbox to detonate suspicious files with a single click and get a detailed and readable report back:

Threat Analytics

Unified IOCs

Assess the impact of threats to your environment and identify actions that can contain them with Threat Analytics:

 

Upload your own indicators of compromise (IOCs) to also get alerted on your own detection logic:

 

Automated investigation and remediation

 Microsoft Threat Experts

Enhance your SOC by turning on automated investigation and remediation:

 

 

Get an additional layer of oversight and analysis to help ensure that threats don’t get missed:

 

 

APIs

Streaming API

Develop Microsoft Defender ATP connected solutions and workflows with a rich set of APIs:

 

 

You can use our streaming API to stream event information directly to Azure storage or to Azure Event Hubs:

 

Conditional access

Security Configuration

Contain a threat by not letting risky devices access your corporate resources through Conditional Access:

 

 

See how you can use Microsoft Endpoint Manager to manage security configuration for Microsoft Defender ATP:

 

 

Microsoft Cloud App Security (MCAS)

Evaluation Lab

Integrating Microsoft Defender ATP and Microsoft Cloud App Security can help control shadow IT and assist with your security investigations:

The evaluation lab eliminates the complexities of machine & environment configuration - you can focus on evaluating the capabilities right away.

 

If you want to stay updated about Microsoft Defender ATP, you can follow our Twitter accounts

 

clipboard_image_1.png

Microsoft Defender ATP

 

clipboard_image_2.png

Heike Ritter

9 Comments
Microsoft

Awesome job team!! All the videos are great!! :stareyes:

Super Contributor

Thanks @Heike Ritter, for these videos.  I also bookmarked the article to come back to them when need be.  We are just in the process of going from O365 E5 to M365 E5.

Microsoft

Love these videos. Thanks, Heike!

Occasional Contributor
Hi, I think there is some good improvements that could be made to RBAC: 1. Limit what can be viewed, e.g. timeline is not suitable for GDPR in Europe or will not sit well with unions. 2. Tag's should be able to be applied in automated fashions like Machine groups. Sometimes you will want to link an action to a tag. Such as apply web filtering for different regions and groups of people. In some cases this would help whereby you base it on the tag rather than the machine group otherwise with only being a member of one machine group you can loose the functionality you would expect. Something else slightly related is that if you use SCEP with Win 7 it seems like ATP can read what happens on the OS but will not report a virus even if it is detected on the endpoint. It will however pick up powershell examples at least but won't pull any logs. Since Windows 7 is around for another 3 years is it not important to add some of the basic level features? i.e. Scan, collect logs, check definitions are in date, submit samples and isolation (could be done with some firewall rules). I
Occasional Contributor
p.s. great videos in general though :)
Senior Member

Video is normally my least-favorite learning method - too time consuming. But these videos are great - short and to the point.

Microsoft

These are really great resources. Thanks @Heike Ritter and team! :smiling_face_with_smiling_eyes:

Occasional Contributor

Great content, however, I prefer when it was hosted on Youtube. There is one massive benefit of youtube over this built-in player - that is speed control options on youtube. I prefer to skim videos on 1.5 or 2.0 speed. Can you please use other players with speed control? Some Microsoft areas (for example ignite and channel9) has non-Youtube player with speed control & download option.

Microsoft

Awesome videos as always!!!