Nirav Kumar: Customized Detections and Response Can Be a Challenge
“[Microsoft Defender for Endpoint] has good behavioral analytics and automatic detections that enable it to identify fileless malware quickly.” Microsoft Defender for Endpoint is an endpoint detection and response tool that captures endpoint telemetry and sends...
Rebecca Wynn: Getting the Most from Microsoft Defender for Endpoint Involves More Than Deployment
“A lot of the cost and value you see from these tools hinges on your ability to use them efficiently so that they deliver those returns day after day.” In addition to familiarizing yourself with Microsoft Defender for Endpoint (formerly Microsoft Defender...
Oscar Monge: Real-Time Vulnerability Reporting in Microsoft Defender for Endpoint
"The most challenging aspect of using Microsoft Defender for Endpoint is ongoing product oversight.” Good security depends on having consistent controls across the environment. Microsoft Defender for Endpoint is deployed as a series of agents on the endpoints...
Michael Kavka: Enroll One Machine and Test Everything
"There are many intricacies in the configurations and settings. Some of them may be important to you, and others may not.” As with any security product, before implementing Microsoft Defender for Endpoint, you must know what is in your environment. If you are...
Maarten Leyman: Automations Are Useful, but Implement Them with Care
“If the automation involves taking actions on critical production servers, you should review those actions before Microsoft Defender for Endpoint executes them.” The first step in implementing Microsoft Defender for Endpoint is to understand what the product does and...
James P. Courtney II: Microsoft Defender for Endpoint Protects Against Many Attack Vectors
“One big advantage of Microsoft Defender for Endpoint is its ability to automate many remediation functions so that you can respond much more quickly to alerts and events.” Microsoft Defender for Endpoint (formerly Microsoft Defender Advanced Threat Protection [ATP])...
Sharjeel Qayyum Khan: You Must Understand What You Want to Extract from Azure Sentinel
“The most challenging aspect of Azure Sentinel deployment is deciding what you need the system to tell you, and then configuring data collection and analytics so that you can extract that information.” Effective security monitoring and analysis require a security...
Rajesh Kumawat: Microsoft Azure Sentinel Is a Different Kind of SIEM System
“Azure Sentinel automatically performs the analytical work on alerts and provides a clear, straightforward presentation of the incident history and event relationships.” The most important part of implementing Microsoft Azure Sentinel is knowing your objectives...
Michael Kavka: Microsoft Azure Sentinel Delivers Visibility and Insight
“Implementing Azure Sentinel is straightforward, coming down to implementing your data connections and deciding how much space to allocate for data storage.” Microsoft Azure Sentinel combines security information event management and security orchestration automated...
Rebecca Wynn: Before You Deploy Microsoft Azure Sentinel, Know What You Want to Accomplish
“Think about the quickest way to get from where you are now to where you want to be using Azure Sentinel.” When implementing Microsoft Azure Sentinel, you must • understand what you want to accomplish through Microsoft Azure Sentinel, which both monitors and...