The 2-Minute Recap: Everything new with Security, Compliance, and Identity on Microsoft Learn

Published Jan 25 2022 08:00 AM 3,833 Views
Microsoft

Welcome to our monthly blog series featuring the latest content updates on Microsoft Learn. This month, we’re highlighting Microsoft Defender for Business training in our Security, Compliance, and Identity portfolio.

 

Microsoft Defender for Business  

Microsoft Defender for Business is a new endpoint security solution that’s now available in preview. Built specially to provide enterprise-grade endpoint security to businesses with up to 300 employees, this solution is both easy to use and cost effective.

 

Today’s preview is available with an initial set of scenarios, and the product team will be adding capabilities regularly. To get started, check out our complete Microsoft Defender for Business documentation page, where you’ll find how-to guides for using, deploying, and managing this solution, along with tutorials and simulations.

 

You can also get an overview of incidents and response actions by completing the Detect and respond to security issues learning module. By the end of this module, you'll be able to understand the:

  • Incident queue
  • Alerts queue
  • Response actions

 

Microsoft Endpoint Configuration Manager

Microsoft Endpoint Manager provides endpoint security, device management, and intelligent cloud actions in a unified management platform. Microsoft Endpoint Configuration Manager—which is a part of Microsoft Endpoint Manager—helps you protect the on-premises devices, apps, and data that the people at your organization use to be productive.

 

Our new learning path, Set up tenant attach using Microsoft Endpoint Configuration Manager, provides migration and implementation guidance, along with details about how to set up Intune, how to set up tenant attach, and better understand co-management. By the end of this module, you’ll be able to:

  • Understand tenant attach
  • Confirm tenant attach prerequisites
  • Enable internet endpoints
  • Enable device upload
  • Display the connector status
  • Perform device actions
  • View on-premises device details

 

We look forward to hearing how you use these resources on your journey to certification. Be sure to check out our new Microsoft Security certifications poster for a quick overview of our fundamentals and role-based credentials as well.

1 Comment
%3CLINGO-SUB%20id%3D%22lingo-sub-2923076%22%20slang%3D%22en-US%22%3EThe%202-Minute%20Recap%3A%20Everything%20new%20with%20Security%2C%20Compliance%2C%20and%20Identity%20on%20Microsoft%20Learn%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2923076%22%20slang%3D%22en-US%22%3E%3CP%3EWelcome%20to%20our%20monthly%20blog%20series%20featuring%20the%20latest%20content%20updates%20on%20Microsoft%20Learn.%20This%20month%2C%20we%E2%80%99re%20highlighting%20Microsoft%20Defender%20for%20Business%20training%20in%20our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Flearn%2Ftopics%2Fsci%3FWT.mc_id%3DSecurity_blog-wwl%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%2C%20Compliance%2C%20and%20Identity%3C%2FA%3E%20portfolio.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--297992857%22%20id%3D%22toc-hId-336555384%22%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Business%20%26nbsp%3B%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fmicrosoft-defender-business%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Business%3C%2FA%3E%20is%20a%20new%20endpoint%20security%20solution%20that%E2%80%99s%20now%20available%20in%20preview.%20Built%20specially%20to%20provide%20enterprise-grade%20endpoint%20security%20to%20businesses%20with%20up%20to%20300%20employees%2C%20this%20solution%20is%20both%20easy%20to%20use%20and%20cost%20effective.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%E2%80%99s%20preview%20is%20available%20with%20an%20initial%20set%20of%20scenarios%2C%20and%20the%20product%20team%20will%20be%20adding%20capabilities%20regularly.%20To%20get%20started%2C%20check%20out%20our%20complete%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-business%2F%3FWT.mc_id%3DSecurity_blog-wwl%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Business%20documentation%20page%3C%2FA%3E%2C%20where%20you%E2%80%99ll%20find%20how-to%20guides%20for%20using%2C%20deploying%2C%20and%20managing%20this%20solution%2C%20along%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-business%2Fmdb-tutorials%3FWT.mc_id%3DSecurity_blog-wwl%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Etutorials%20and%20simulations%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20also%20get%20an%20overview%20of%20incidents%20and%20response%20actions%20by%20completing%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Flearn%2Fmodules%2Fm365-detect-respond-security-issues-defender-endpoint%2F%3FWT.mc_id%3DSecurity_blog-wwl%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDetect%20and%20respond%20to%20security%20issues%3C%2FA%3E%20learning%20module.%20By%20the%20end%20of%20this%20module%2C%20you'll%20be%20able%20to%20understand%20the%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EIncident%20queue%3C%2FLI%3E%0A%3CLI%3EAlerts%20queue%3C%2FLI%3E%0A%3CLI%3EResponse%20actions%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--2105447320%22%20id%3D%22toc-hId--1470899079%22%3EMicrosoft%20Endpoint%20Configuration%20Manager%3C%2FH2%3E%0A%3CP%3EMicrosoft%20Endpoint%20Manager%20provides%20endpoint%20security%2C%20device%20management%2C%20and%20intelligent%20cloud%20actions%20in%20a%20unified%20management%20platform.%20Microsoft%20Endpoint%20Configuration%20Manager%E2%80%94which%20is%20a%20part%20of%20Microsoft%20Endpoint%20Manager%E2%80%94helps%20you%20protect%20the%20on-premises%20devices%2C%20apps%2C%20and%20data%20that%20the%20people%20at%20your%20organization%20use%20to%20be%20productive.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20new%20learning%20path%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Flearn%2Fmodules%2Fsetup-tenant-attach-using-configuration-manager%2F%3FWT.mc_id%3DSecurity_blog-wwl%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESet%20up%20tenant%20attach%20using%20Microsoft%20Endpoint%20Configuration%20Manager%3C%2FA%3E%2C%20provides%20migration%20and%20implementation%20guidance%2C%20along%20with%20details%20about%20how%20to%20set%20up%20Intune%2C%20how%20to%20set%20up%20tenant%20attach%2C%20and%20better%20understand%20co-management.%20By%20the%20end%20of%20this%20module%2C%20you%E2%80%99ll%20be%20able%20to%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EUnderstand%20tenant%20attach%3C%2FLI%3E%0A%3CLI%3EConfirm%20tenant%20attach%20prerequisites%3C%2FLI%3E%0A%3CLI%3EEnable%20internet%20endpoints%3C%2FLI%3E%0A%3CLI%3EEnable%20device%20upload%3C%2FLI%3E%0A%3CLI%3EDisplay%20the%20connector%20status%3C%2FLI%3E%0A%3CLI%3EPerform%20device%20actions%3C%2FLI%3E%0A%3CLI%3EView%20on-premises%20device%20details%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20look%20forward%20to%20hearing%20how%20you%20use%20these%20resources%20on%20your%20journey%20to%20certification.%20Be%20sure%20to%20check%20out%20our%20new%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FSCICerts_Poster%3FWT.mc_id%3DSecurity_blog-wwl%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Security%20certifications%20poster%3C%2FA%3E%20for%20a%20quick%20overview%20of%20our%20fundamentals%20and%20role-based%20credentials%20as%20well.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2923076%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222-min%20recap_Security%20blog%20image.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F340441i269FC4FF686B073E%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%222-min%20recap_Security%20blog%20image.jpg%22%20alt%3D%222-min%20recap_Security%20blog%20image.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ECheck%20out%20our%20Microsoft%20Defender%20for%20Business%20learning%20content.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2923076%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%20Compliance%20and%20Identity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Jan 18 2022 11:28 AM
Updated by: