Technical requirements
In order to proceed with this chapter, you need to have the following requirements ready:
- Full understanding of Defender for Endpoint, from onboarding and configuring endpoints to investigating alerts.
- Understanding of Microsoft 365 Defender with identity protection, Defender for Office, Defender for Identity, Defender for Cloud Apps to DLP, and insider risk.
- Microsoft Defender for Cloud: Be familiar with Azure services that can be protected.
- Configuring Sentinel, connecting logs, handling detections, investigations, and threat hunting.
- Kusto Query Language (KQL).