Chapter 10: Describing Threat Protection with Microsoft 365 Defender
In the previous chapter, we covered how to manage the protection of resources within Azure through Cloud Security Posture Management (CSPM) within Microsoft Defender for Cloud. This included how to use security baselines within Azure to set up the best practice protection for your compute, application, and data resources. In this chapter, we will describe how to manage the protection of Microsoft 365 resources through the extended detection and response (XDR) capabilities of Microsoft 365 Defender.
In this chapter, we're going to cover the following main topics:
- Describing the XDR and Microsoft 365 Defender services
- Describing Microsoft Defender for Office 365
- Describing Microsoft Defender for Cloud Apps
- Describing Microsoft Defender for Identity
- Describing Microsoft Defender for Endpoint