Describe threat protection with Microsoft Defender XDR Flashcards
Microsoft Defender XDR
enterprise defense suite that protects against sophisticated cyberattacks
t or f
With Microsoft Defender XDR, you can natively coordinate the detection, prevention, investigation, and response to threats across endpoints, identities, email, and applications.
true
Microsoft Defender XDR allows admins to assess threat signals from
endpoints
applications
email
identities
to determine an attacks scope and impact
Microsoft Defender XDR suite protects:
Endpoints with Microsoft Defender for Endpoint
Assets with Defender Vulnerability Management
Email and collaboration with Microsoft Defender for Office 365
Identities with Microsoft Defender for Identity
Applications with Microsoft Defender for Cloud Apps
Endpoints with Microsoft Defender for Endpoint
unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response.
Assets with Defender Vulnerability Management
delivers continuous asset visibility, intelligent risk-based assessments, and built-in remediation tools to help your security and IT teams prioritize and address critical vulnerabilities and misconfigurations across your organization.
Email and collaboration with Microsoft Defender for Office 365
safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
Identities with Microsoft Defender for Identity
uses Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Applications with Microsoft Defender for Cloud Apps
comprehensive cross-SaaS solution that brings deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
subscribers to Microsoft Defender Threat Intelligence (Defender TI) can now access threat intelligence from
inside the Microsoft Defender portal
Microsoft Defender TI helps streamline
security analyst triage, incident response, threat hunting, and vulnerability management workflows
Microsoft Defender for Office 365
a seamless integration into your Office 365 subscription that provides protection against threats, like phishing and malware that arrive in email links (URLs), attachments, or collaboration tools like SharePoint, Teams, and Outlook
t or f
Defender for Office 365 does not provides real-time views of threats
false. it does provide real time views of threats
Microsoft Defender for Office 365 safeguards organizations against malicious threats by providing admins and security operations (sec ops) teams a wide range of capabilities
Preset security policies
Threat protection policies
Reports
Threat investigation and response capabilities
Automated investigation and response capabilities
preset security policies
allow you to apply protection features to users based on Microsoft recommended settings
A use case for preset security policies is during installation
Threat protection policies
define threat protection policies to set the appropriate level of protection for your organization
Reports
view real time reports to monitor Microsoft Defender for Office 365 performance
Threat investigation and response capabilities:
use leading-edge tools to investigate, understand, simulate, and prevent threats.
Automated investigation and response capabilities
Save time and effort investigating and mitigating threats
Microsoft Defender for Office 365 is available in two plans
Plan 1
Plan 2
The security services of Defender for Office 365 are built on the core protections offered by
EOP - Exchange Online Protection
EOP - Exchange Online Protection
helps prevent broad, volume-based, known attacks and is present in any subscription where Exchange Online mailboxes can be found
Microsoft Defender for Office 365 P1 contains
EOP in it plus protects email and collaboration from zero-day malware, phish, and business email compromise
Defender for Office 365 P2
contains P1 and EOP and adds post-breach investigation, hunting, response, automation, and training simulation.
The structure is cumulative.
Microsoft Defender for Endpoint
a platform designed to help enterprise networks protect endpoints including laptops, phones, tablets, PCs, access points, routers, and firewalls.
Microsoft Defender for Endpoint tech includes
Endpoint behavioral sensors
Cloud Security analytics
Threat intelligence
Microsoft Defender for Endpoint includes
Core Defender Vulnerability Management
Attack Surface reduction
Next generation protection
Endpoint detection and response
Automated investigation and remediation (AIR)
Microsoft Secure Score for Devices
Microsoft Threat Experts
Management and APIs
Core Defender Vulnerability Management:
use a risk based approach to the discovery, assessment, prioritization, and remediation of endpoint vulnerabilities and misconfigurations
Attack surface reduction
first line defense in the stack
By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation.
also includes network protection and web protection, which regulate access to malicious IP addresses, domains, and URLs.
Next generation protection
designed to catch all types of emerging threats
behavior based, heuristic, & real time antivirus protection
cloud delivered protection - includes near instant detection and blocking of new and emerging threats
dedicated protection and product updates - includes updates related to keeping Microsoft Defender Antivirus up to date
Endpoint detection and response
Provides advanced attack detections that are near real time and actionable
Security analysts can prioritize alerts, see the full scope of a breach, and take response actions to remediate threats
Automated investigation and remediation (AIR)
capabilities are designed to examine alerts and take immediate action to resolve breaches
significantly reduce alert volume, allowing security operations to focus on more sophisticated threats and other high-value initiatives
Microsoft Secure Score for Devices
helps you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
Microsoft Threat Experts
provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
Management and APIs
offers an API model designed to expose entities and capabilities through a standard Microsoft Entra ID based authentication and authorization model
t or f
Microsoft Defender for Endpoint also integrates with various components in the Microsoft Defender suite, and with other Microsoft solutions including Intune and Microsoft Defender for Cloud.
true
How many plans are available for Microsoft Defender for Cloud?
2
plan 1 and plan 2
t or f
Microsoft Defender for Cloud Apps delivers full protection for SaaS applications
true