The Fundamentals of Microsoft Defender for Endpoint
We’ll begin our journey of deploying and configuring Microsoft Defender for Endpoint (MDE) by exploring its fundamentals. Why is a full chapter dedicated to this? Well, it’s complicated. No, really, it is! MDE’s complexity is a result of its far-reaching scope of different security capabilities, its support for a diverse set of OSs, and the ability for us to manage its features from different administrative systems.
In this chapter, you will learn important background knowledge about MDE. By learning the fundamentals, you will be able to understand the terminology and architectural options, and you will be braced for the inevitable changes of a cloud-based service. This chapter should be seen as a prerequisite to the upcoming chapters about onboarding and configuring MDE, as it sets the context for many decisions you will be making in your deployment.
In a nutshell, the following topics will be covered in...