Microsoft Defender for Endpoint Ninja Training: August 2021 update

Published Aug 04 2021 10:38 AM 7,601 Views
Microsoft

We published a lot of new Microsoft Defender for Endpoint resources over the past few months and have these now included in the Ninja training. If you want to refresh your knowledge and get updated, here is what has been added since the February 2021 update:

 

Legend:

vid.png Product videos

webcast.png Webcast recordings

TechCommunity.png Tech Community

docs.png Docs on Microsoft

blogs.png Blogs on Microsoft

GitHub.png GitHub

⤴ External

InteractiveGuides.png Interactive guides

 

 

Module (ordered by roles SecOps & SecAdmin)

What's new

Security Operations Fundamentals:

Module 2. Getting started

Security Operations Fundamentals:

Module 6. Investigation – Incident

Security Operations Intermediate:

Module 2. Threat and vulnerability management

Security Operations Intermediate:

Module 3. Next generation protection

Security Operations Intermediate:

Module 8. Evaluation Lab

Security Operations Experts:

Module 4. Advanced hunting

Security Administrator Fundamentals,

Module 2. Onboarding

Security Administrator Fundamentals,

Module 4. Security configuration

Security Administrator Intermediate,

Module 1. Threat and vulnerability management

Security Administrator Intermediate,

Module 2. Attack surface reduction

Security Administrator Intermediate,

Module 3. Next generation protection

Security Administrator Intermediate,

Module 8. Migration

Security Administrator Expert,

Module 3. Custom Integrations, APIs

 

 
1 Comment
Regular Visitor

Amazing thanks for share with us...

%3CLINGO-SUB%20id%3D%22lingo-sub-2611623%22%20slang%3D%22en-US%22%3EMicrosoft%20Defender%20for%20Endpoint%20Ninja%20Training%3A%20August%202021%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2611623%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20published%20a%20lot%20of%20new%20Microsoft%20Defender%20for%20Endpoint%20resources%20over%20the%20past%20few%20months%20and%20have%20these%20now%20included%20in%20the%20Ninja%20training.%26nbsp%3BIf%20you%20want%20to%20refresh%20your%20knowledge%20and%20get%20updated%2C%20here%20is%20what%20has%20been%20added%20since%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fmicrosoft-defender-for-endpoint-ninja-training-february-2021%2Fba-p%2F2118350%22%20target%3D%22_blank%22%3EFebruary%202021%20update%3C%2FA%3E%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELegend%3A%3C%2FP%3E%20%3CP%3EProduct%20videos%3C%2FP%3E%20%3CP%3EWebcast%20recordings%3C%2FP%3E%20%3CP%3ETech%20Community%3C%2FP%3E%20%3CP%3EDocs%20on%20Microsoft%3C%2FP%3E%20%3CP%3E%26nbsp%3BBlogs%20on%20Microsoft%3C%2FP%3E%20%3CP%3E%26nbsp%3BGitHub%3C%2FP%3E%20%3CP%3E%E2%A4%B4%20External%3C%2FP%3E%20%3CP%3E%26nbsp%3BInteractive%20guides%3C%2FP%3E%20%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3E%20%3CP%3EModule%20(ordered%20by%20roles%20SecOps%20%26amp%3B%20SecAdmin)%3C%2FP%3E%20%3CP%3EWhat's%20new%3C%2FP%3E%20%3CP%3ESecurity%20Operations%20Fundamentals%3A%3C%2FP%3E%3CP%3EModule%202.%20Getting%20started%3C%2FP%3E%20%20%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fwelcome-to-microsoft-365-defender%2Fba-p%2F2436618%22%20target%3D%22_blank%22%3EWelcome%20to%20Microsoft%20365%20Defender!%3C%2FA%3E%3CP%3ESecurity%20Operations%20Fundamentals%3A%3C%2FP%3EModule%206.%20Investigation%20%E2%80%93%20Incident%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fmitre-att-amp-ck-techniques-now-available-in-the-device-timeline%2Fba-p%2F2136788%22%20target%3D%22_blank%22%3EMITRE%20ATT%26amp%3BCK%20Techniques%20available%20in%20the%20device%20timeline%3C%2FA%3E%3CP%3ESecurity%20Operations%20Intermediate%3A%3C%2FP%3EModule%202.%20Threat%20and%20vulnerability%20management%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fendpoint-discovery-navigating-your-way-through-unmanaged-devices%2Fba-p%2F2248909%22%20target%3D%22_blank%22%3EEndpoint%20Discovery%20-%20Navigating%20your%20way%20through%20unmanaged%20devices%3C%2FA%3E%3CP%3ESecurity%20Operations%20Intermediate%3A%3C%2FP%3EModule%203.%20Next%20generation%20protection%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fenhancing-linux-antivirus-with-behavior-monitoring-capabilities%2Fba-p%2F2226705%22%20target%3D%22_blank%22%3EEnhancing%20Linux%20antivirus%20with%20behavior%20monitoring%20capabilities%3C%2FA%3E%3CP%3ESecurity%20Operations%20Intermediate%3A%3C%2FP%3EModule%208.%20Evaluation%20Lab%20%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fevaluation-lab%3Fview%3Do365-worldwide%23request-for-more-devices%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EUpdates%20to%20the%20evaluation%20lab%3C%2FA%3E%3CP%3ESecurity%20Operations%20Experts%3A%3C%2FP%3EModule%204.%20Advanced%20hunting%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fhow-to-migrate-advanced-hunting-to-microsoft-365-defender%2Fba-p%2F2409440%22%20target%3D%22_blank%22%3EHow%20to%20migrate%20advanced%20hunting%20to%20Microsoft%20365%20Defender%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fadvanced-hunting-updates-to-threat-and-vulnerability-management%2Fba-p%2F2162584%22%20target%3D%22_blank%22%3EAdvanced%20hunting%3A%20updates%20to%20threat%20and%20vulnerability%20management%20tables%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-devicetvmsoftwareinventory-table%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EDeviceTvmSoftwareInventory%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-devicetvmsoftwarevulnerabilities-table%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EDeviceTvmSoftwareVulnerabilities%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Fundamentals%2C%3C%2FP%3E%3CP%3EModule%202.%20Onboarding%3C%2FP%3E%20%20%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fone-app-for-vpn-and-mobile-threat-defense%2Fba-p%2F2170142%22%20target%3D%22_blank%22%3EOne%20app%20for%20VPN%20and%20mobile%20threat%20defense%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fendpoint-discovery-navigating-your-way-through-unmanaged-devices%2Fba-p%2F2248909%22%20target%3D%22_blank%22%3EEndpoint%20Discovery%20-%20Navigating%20your%20way%20through%20unmanaged%20devices%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Fundamentals%2C%3C%2FP%3E%3CP%3EModule%204.%20Security%20configuration%3C%2FP%3E%20%20%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fannouncing-a-global-switch-for-tamper-protection%2Fba-p%2F2192490%22%20target%3D%22_blank%22%3EA%20global%20switch%20for%20tamper%20protection%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fsecure-configuration-assessment-for-macos-and-linux-now-in%2Fba-p%2F2320517%22%20target%3D%22_blank%22%3ESecure%20configuration%20assessment%20for%20macOS%20and%20Linux%20now%20in%20public%20preview%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Intermediate%2C%3C%2FP%3E%3CP%3EModule%201.%20Threat%20and%20vulnerability%20management%3C%2FP%3E%20%20%20%26nbsp%3BUpdated%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Ftvm-supported-os%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ESupported%20operating%20systems%2C%20platforms%20and%20capabilities%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fthreat-amp-vulnerability-management-integrates-with-servicenow%2Fba-p%2F2454065%22%20target%3D%22_blank%22%3EThreat%20and%20vulnerability%20management%20integrates%20with%20ServiceNow%20VR%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fnew-threat-and-vulnerability-management-experiences-in-microsoft%2Fba-p%2F2233284%22%20target%3D%22_blank%22%3ENew%20threat%20and%20vulnerability%20management%20experiences%20in%20Microsoft%20365%20security%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fnew-threat-amp-vulnerability-management-apis-create-reports%2Fba-p%2F2445813%22%20target%3D%22_blank%22%3ENew%20APIs%20-%20create%20reports%2C%20automate%2C%20integrate%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fnetwork-device-discovery-and-vulnerability-assessments%2Fba-p%2F2267548%22%20target%3D%22_blank%22%3ENetwork%20device%20discovery%20and%20vulnerability%20assessments%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fdevice-discovery%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EDevice%20discovery%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fvulnerability-management-for-linux-now-generally-available%2Fba-p%2F2451145%22%20target%3D%22_blank%22%3EVulnerability%20management%20for%20Linux%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Intermediate%2C%3C%2FP%3E%3CP%3EModule%202.%20Attack%20surface%20reduction%3C%2FP%3E%20%20%20%26nbsp%3BUpdated%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fattack-surface-reduction%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ELearn%20about%20attack%20surface%20reduction%20rules%3C%2FA%3E%20Details%20about%20using%26nbsp%3BMicrosoft%20Endpoint%20Manager%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fenable-attack-surface-reduction%3Fview%3Do365-worldwide%23mem%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMEM%20OMA-URI%3C%2FA%3E%26nbsp%3Bto%20configure%20ASR%20rules%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fmac-updates-control-your-usb-devices-with-microsoft-defender-for%2Fba-p%2F2224439%22%20target%3D%22_blank%22%3EUSB%20device%20control%20on%20Mac%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fmac-device-control-overview%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EDevice%20control%20for%20MacOS%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Intermediate%2C%3C%2FP%3E%3CP%3EModule%203.%20Next%20generation%20protection%3C%2FP%3E%20%20%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fannouncing-new-capabilities-on-android-and-ios%2Fba-p%2F2442730%22%20target%3D%22_blank%22%3ENew%20capabilities%20on%20Android%20and%20iOS%3C%2FA%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fenhancing-linux-antivirus-with-behavior-monitoring-capabilities%2Fba-p%2F2226705%22%20target%3D%22_blank%22%3EEnhancing%20Linux%20antivirus%20with%20behavior%20monitoring%20capabilities%3C%2FA%3E%20%26nbsp%3BUpdated%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fmicrosoft-defender-antivirus-compatibility%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20Antivirus%20compatibility%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Intermediate%2C%3C%2FP%3E%3CP%3EModule%208.%20Migration%3C%2FP%3E%20%20%20%26nbsp%3BUpdated%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fswitch-to-microsoft-defender-setup%3Fview%3Do365-worldwide%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Esetup%20phase%20of%20the%20migration%20guide%3C%2FA%3E%3CP%3ESecurity%20Administrator%20Expert%2C%3C%2FP%3E%3CP%3EModule%203.%20Custom%20Integrations%2C%20APIs%3C%2FP%3E%20%20%20%26nbsp%3BNew%20threat%20and%20vulnerability%20management%20API%20collection%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fget-assessmnt-1methods-properties%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EExport%20Assessment%20API%3C%2FA%3E%20%26nbsp%3BNew%20threat%20and%20vulnerability%20management%20API%20collection%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fget-remediation-methods-properties%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3ERemediation%20Activity%3C%2FA%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%20%26nbsp%3B%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2611623%22%20slang%3D%22en-US%22%3E%3CP%3EGet%20an%20update%20about%20the%20latest%20additions%20we%20made%20to%20the%20Microsoft%20Defender%20for%20Endpoint%20Ninja%20training.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2847670%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Endpoint%20Ninja%20Training%3A%20August%202021%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2847670%22%20slang%3D%22en-US%22%3E%3CP%3EAmazing%20thanks%20for%20share%20with%20us...%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Aug 04 2021 10:42 AM
Updated by: