From the course: Microsoft 365 Administrator Expert (MS-102) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,000 courses taught by industry experts.
Review and respond to endpoint vulnerabilities - Microsoft 365 Tutorial
From the course: Microsoft 365 Administrator Expert (MS-102) Cert Prep by Microsoft Press
Review and respond to endpoint vulnerabilities
- So on implement and manage Endpoint protection by using Microsoft Defender for Endpoint. Let's look at review and respond to Endpoint vulnerabilities. Especially when you integrate Intune with Microsoft Defender for Endpoint, you can take advantage for Defender for Endpoints, threat and vulnerability management, and use Intune to remediate Endpoint weaknesses identified by Defender for Vulnerability Management capability. So let's look at where to find these vulnerabilities and where the vulnerability management is located. And then once you located the vulnerability, you can use Intune to remediate them more effectively. So when you manage Endpoint vulnerabilities with Microsoft Defender Vulnerability Management, the organizations can reduce cybersecurity risk by implementing range of features in Microsoft Defender Vulnerability Management. So number one is assess discovery and inventory. So then once you onboard a…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives1m 25s
-
(Locked)
Onboard devices to Defender for Endpoint5m 31s
-
(Locked)
Configure Defender for Endpoint settings5m 53s
-
(Locked)
Review and respond to endpoint vulnerabilities3m 48s
-
(Locked)
Review and respond to risks identified in the Microsoft Defender Vulnerability Management dashboard6m 9s
-
(Locked)
-
-
-