Further reading
There may be some specific scenarios regarding onboarding that this book has not discussed. You can find useful information and examples of these by looking at the following links:
- In this chapter, you learned about device tags. You can set these using registry keys and/or Intune, as well as the Microsoft 365 Defender portal, and this blog has some information about that: campbell.scot/use-intune-to-manage-microsoft-defender-for-endpoint-tags-and-device-groups.
- When you want MDE RBAC, you cannot use built-in Azure AD roles, which also means native Privileged Identity Management (PIM) isn’t supported. In this article, Fabian Bader guides you on how it can still be achieved using privileged access groups: cloudbrothers.info/en/jit-role-assignment-microsoft-defender.
- The fundamentals you read about in this chapter are less likely to change as fast as the features of MDE, which you can keep up to date with by following Tech Community’s Microsoft...