sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
4.4 Perform device investigations in Microsoft Defender for Endpoint

4.4 Perform device investigations in Microsoft Defender for Endpoint

wwlpublish Perform device investigations in Microsoft Defender for Endpoint - Trainingwwlpublish Perform device investigations in Microsoft Defender for Endpoint - Training

‣

Introduction

‣

Use the device inventory list

‣

Investigate the device

‣

Use behavioral blocking

‣

Detect devices with device discovery

‣

Knowledge check

‣

Summary and resources

©sameer fakhoury

GitHubLinkedIn