sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
4.6 Perform evidence and entities investigations using Microsoft Defender for Endpoint

4.6 Perform evidence and entities investigations using Microsoft Defender for Endpoint

  • wwlpublish Perform evidence and entities investigations using Microsoft Defender for Endpoint - Trainingwwlpublish Perform evidence and entities investigations using Microsoft Defender for Endpoint - Training
‣

Introduction

‣

Investigate a file

‣

Investigate a user account

‣

Investigate an IP address

‣

Investigate a domain

‣

Knowledge check

‣

Summary and resources

©sameer fakhoury

GitHubLinkedIn