Part 2: Implementing and Managing Threat Protection
In this part, you will learn how to configure and manage Microsoft 365 threat protection components. On completion, you will be able to describe the components of Microsoft Defender for Identity, Microsoft Defender for Endpoint, and Microsoft Defender for Office 365. You will also have learned how to monitor Microsoft 365 using Microsoft Sentinel and how to use Microsoft Defender for Cloud Apps.
This part has the following chapters:
- Chapter 6, Configuring a Microsoft Defender for Identity Solution
- Chapter 7, Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune
- Chapter 8, Configuring Microsoft Defender for Office 365
- Chapter 9, Using Microsoft Sentinel to Monitor Microsoft 365 Security
- Chapter 10, Configuring Microsoft Defender for Cloud Apps