Part 1 – Introduction and Basic Configuration
In this part, we will introduce you to the cyber security threat landscape, security strategies, the Defender ecosystem, and the security deficiencies that Defender for Office 365 should correct. We will also explain the different components of Defender for Office 365 and how they work together to protect an organization. We will discuss what happens when a component is misconfigured. Next, we will help you identify the type of security your organization needs and align your Defender for Office 365 deployment accordingly. Finally, we will teach you how to perform a basic deployment of Defender for Office 365 and explain the impact it will have on end users.
This part contains the following chapters:
- Chapter 1, The Security Wild West
- Chapter 2, Basic Components of Defender for Office 365
- Chapter 3, Basic Checks and Balances
- Chapter 4, Basics of Configuration