Summary
Now that we've completed our MDE onboarding, learned how to troubleshoot installations and deployments, and verified that the endpoints are reporting in, it's time to move on to the next chapter.
With the skills we've learned, we can start to focus more on the alerts coming in from these endpoints and how to deal with them, working more from a Security Operations Center (SOC) analyst role. Before we get totally immersed into triaging alerts though, let's get a few more tools rolled out.
In the next chapter, we'll cover onboarding Microsoft Defender for Identity. Defender for Identity is potentially my favorite tool in the M365 security stack, and I'm excited to get into it!