Part 6: Proactive Security and Incident Response
Throughout the book so far, you’ve learned how to deploy a well-architected Microsoft 365 Defender stack, covering MDE, MDI, MDO, and MDA. Now, we can look at tying it all together. First in this part, you’ll learn about using MDVM and threat analytics for cybersecurity hygiene, and then we'll start to explore using XDR and advanced hunting capabilities for incident response, before closing with integration using Sentinel and APIs.
This part has the following chapters:
- Chapter 17, Maintaining Security Hygiene and Threat Awareness
- Chapter 18, Extended Detection and Response with Microsoft 365 Defender
- Chapter 19, Advanced Hunting with KQL
- Chapter 20, Microsoft Sentinel Integration
- Chapter 21, Understanding Microsoft 365 Defender APIs