Describe threat protection with Microsoft Defender XDR Flashcards
(97 cards)
Microsoft Defender XDR
enterprise defense suite that protects against sophisticated cyberattacks
t or f
With Microsoft Defender XDR, you can natively coordinate the detection, prevention, investigation, and response to threats across endpoints, identities, email, and applications.
true
Microsoft Defender XDR allows admins to assess threat signals from
endpoints
applications
email
identities
to determine an attacks scope and impact
Microsoft Defender XDR suite protects:
Endpoints with Microsoft Defender for Endpoint
Assets with Defender Vulnerability Management
Email and collaboration with Microsoft Defender for Office 365
Identities with Microsoft Defender for Identity
Applications with Microsoft Defender for Cloud Apps
Endpoints with Microsoft Defender for Endpoint
unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response.
Assets with Defender Vulnerability Management
delivers continuous asset visibility, intelligent risk-based assessments, and built-in remediation tools to help your security and IT teams prioritize and address critical vulnerabilities and misconfigurations across your organization.
Email and collaboration with Microsoft Defender for Office 365
safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
Identities with Microsoft Defender for Identity
uses Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Applications with Microsoft Defender for Cloud Apps
comprehensive cross-SaaS solution that brings deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
subscribers to Microsoft Defender Threat Intelligence (Defender TI) can now access threat intelligence from
inside the Microsoft Defender portal
Microsoft Defender TI helps streamline
security analyst triage, incident response, threat hunting, and vulnerability management workflows
Microsoft Defender for Office 365
a seamless integration into your Office 365 subscription that provides protection against threats, like phishing and malware that arrive in email links (URLs), attachments, or collaboration tools like SharePoint, Teams, and Outlook
t or f
Defender for Office 365 does not provides real-time views of threats
false. it does provide real time views of threats
Microsoft Defender for Office 365 safeguards organizations against malicious threats by providing admins and security operations (sec ops) teams a wide range of capabilities
Preset security policies
Threat protection policies
Reports
Threat investigation and response capabilities
Automated investigation and response capabilities
preset security policies
allow you to apply protection features to users based on Microsoft recommended settings
A use case for preset security policies is during installation
Threat protection policies
define threat protection policies to set the appropriate level of protection for your organization
Reports
view real time reports to monitor Microsoft Defender for Office 365 performance
Threat investigation and response capabilities:
use leading-edge tools to investigate, understand, simulate, and prevent threats.
Automated investigation and response capabilities
Save time and effort investigating and mitigating threats
Microsoft Defender for Office 365 is available in two plans
Plan 1
Plan 2
The security services of Defender for Office 365 are built on the core protections offered by
EOP - Exchange Online Protection
EOP - Exchange Online Protection
helps prevent broad, volume-based, known attacks and is present in any subscription where Exchange Online mailboxes can be found
Microsoft Defender for Office 365 P1 contains
EOP in it plus protects email and collaboration from zero-day malware, phish, and business email compromise
Defender for Office 365 P2
contains P1 and EOP and adds post-breach investigation, hunting, response, automation, and training simulation.
The structure is cumulative.