Microsoft for Home & Business
- Overview of Microsoft 365 Lighthouse
- Microsoft Defender for Business (preview) troubleshooting
- Microsoft Defender for Business (preview) – Frequently asked questions and answers
- Get help and support for Microsoft Defender for Business (preview)
- Manage your custom rules for firewall policies in Microsoft Defender for Business (preview)
- Firewall in Microsoft Defender for Business (preview)
- Understand next-generation configuration settings in Microsoft Defender for Business (preview)
- Device groups in Microsoft Defender for Business (preview)
- Understand policy order in Microsoft Defender for Business (preview)
- Create a new policy in Microsoft Defender for Business (preview)
- View or edit policies in Microsoft Defender for Business (preview)
- Reports in Microsoft Defender for Business (preview)
- Review remediation actions in the Action center (Microsoft)
- Respond to and mitigate threats in Microsoft Defender for Business (preview)
- Manage devices in Microsoft Defender for Business (preview)
- Onboard devices to Microsoft Defender for Business (preview)
- Configure your security settings and policies in Microsoft Defender for Business (preview)
- Get started using Microsoft Defender for Business (preview)
- View and manage incidents in Microsoft Defender for Business (preview)
- Tutorials and simulations in Microsoft Defender for Business (preview)
- Set up email notifications (Microsoft)
- Assign roles and permissions in Microsoft Defender for Business (preview)
- Set up and configure Microsoft Defender for Business (preview)
- Microsoft 365 Lighthouse and Microsoft Defender for Business (preview)
- Microsoft Defender for Business (preview) requirements
- Compare Microsoft Defender for Business (preview) to Microsoft 365 Business Premium
- Get Microsoft Defender for Business (preview)
- The simplified configuration process in Microsoft Defender for Business (preview)
- Overview of Microsoft Defender for Business (preview)
- Support and troubleshooting Microsoft Defender for Cloud Apps
- Past-release archive of Microsoft Defender for Cloud Apps
- Microsoft Defender for Cloud Apps e-books
- Microsoft Defender for Cloud Apps webinars
- Troubleshooting – What is *.cas.ms, *.mcas.ms, or *.mcas-gov.us? (Microsoft)
- Troubleshooting access and session controls (Microsoft)
- Troubleshooting Microsoft Defender for Cloud Apps policies
- Troubleshooting the SIEM agent (Microsoft)
- Troubleshooting content inspection (Microsoft)
- Troubleshooting App Connectors using error messages (Microsoft)
- Troubleshooting Cloud Discovery (Microsoft)
- Fetch – Files API (Microsoft)
- List – Files API (Microsoft)
- Files API (Microsoft)
- Fetch entity tree – Entities API (Microsoft)
- Fetch – Entities API (Microsoft)
- List – Entities API (Microsoft)
- Entities API (Microsoft)
- Delete IP address range – Data Enrichment API (Microsoft)
- Update IP address range – Data Enrichment API (Microsoft)
- Create IP address range – Data Enrichment API (Microsoft)
- List – Data Enrichment API (Microsoft)
- Manage IP address ranges using the API (Microsoft)
- Data Enrichment API (Microsoft)
- Generate block script – Cloud Discovery API (Microsoft)
- List continuous report categories – Cloud Discovery API (Microsoft)
- List continuous reports – Cloud Discovery API (Microsoft)
- Perform file upload – Cloud Discovery API (Microsoft)
- Finalize file upload – Cloud Discovery API (Microsoft)
- Initiate file upload – Cloud Discovery API (Microsoft)
- Cloud Discovery API (Microsoft)
- Mark as unread – Alerts API (Microsoft)
- Mark as read – Alerts API (Microsoft)
- Fetch – Alerts API (Microsoft)
- Close true positive – Alerts API (Microsoft)
- Close false positive – Alerts API (Microsoft)
- Close benign – Alerts API (Microsoft)
- List – Alerts API (Microsoft)
- Alerts API (Microsoft)
- Feedback on activity – Activities API (Microsoft)
- Fetch – Activities API (Microsoft)
- List – Activities API (Microsoft)
- Investigate activities using the API (Microsoft)
- Activities API (Microsoft)
- Managing internal tokens (legacy) (Microsoft)
- Access Microsoft Defender for Cloud Apps API with user context (preview)
- Create an app to access Microsoft Defender for Cloud Apps without a user (preview)
- Managing API tokens (Microsoft)
- Defender for Cloud Apps REST API (Microsoft)
- Information protection policies (Microsoft)
- Threat protection policies (Microsoft)
- Cloud Discovery policies (Microsoft)
- Attest your app (Microsoft)
- Integrate with Microsoft Power Automate for custom alert automation
- External DLP integration (Microsoft)
- Additional integrations with external solutions (Microsoft)
- Generic SIEM integration (Microsoft)
- Microsoft Sentinel integration (preview)
- Microsoft Information Protection integration
- Azure Active Directory Identity Protection integration (Microsoft)
- Microsoft Defender for Identity integration
- Govern discovered apps (Microsoft)
- Govern discovered apps using Microsoft Defender for Endpoint
- Governing connected apps (Microsoft)
- Policy template reference (Microsoft)
- Cloud Discovery anomaly detection policy (Microsoft)
- Create Cloud Discovery policies (Microsoft)
- Session policies (Microsoft)
- Working with the RegEx engine (Microsoft)
- Access policies (Microsoft)
- Access policies (Microsoft)
- Microsoft Data Classification Services integration
- Built-in content inspection (Microsoft)
- Content inspection (Microsoft)
- File policies (Microsoft)
- OAuth app policies (Microsoft)
- Get behavioral analytics and anomaly detection (Microsoft)
- Activity policies (Microsoft)
- Control cloud apps with policies (Microsoft)
- Governing connected apps (Microsoft)
- Control (Microsoft)
- How to investigate anomaly detection alerts (Microsoft)
- Manage alerts (Microsoft)
- Monitor alerts in Defender for Cloud Apps (Microsoft)
- Security configuration for Google Cloud Platform (Microsoft)
- Security configuration for AWS (Microsoft)
- Security configuration for Azure (Microsoft)
- Security configuration overview (Microsoft)
- Manage OAuth apps (Microsoft)
- Accounts (Microsoft)
- Investigate apps discovered by Microsoft Defender for Endpoint
- Investigate (Microsoft)
- Onboard and deploy Conditional Access App Control for any web app using Okta as the identity provider (IdP) (Microsoft)
- Onboard and deploy Conditional Access App Control for any web app using Active Directory Federation Services (AD FS) as the identity provider (IdP) (Microsoft)
- Onboard and deploy Conditional Access App Control for any web app using PingOne as the identity provider (IdP) (Microsoft)
- Onboard and deploy Conditional Access App Control for any app (Microsoft)
- Deploy Conditional Access App Control for featured apps (Microsoft)
- Discovered app filters and queries (Microsoft)
- Add custom apps to Cloud Discovery (Microsoft)
- Cloud Discovery data anonymization (Microsoft)
- Cloud Discovery enrichment (Microsoft)
- Use a custom log parser (Microsoft)
- Advanced log collector management (Microsoft)
- Docker on Linux on-premises (Microsoft)
- Docker on Linux in Azure (Microsoft)
- Configure automatic log upload for continuous reports (Microsoft)
- Create snapshot Cloud Discovery reports
- Integrate Defender for Cloud Apps with Open Systems
- Integrate Defender for Cloud Apps with Menlo Security (Microsoft)
- Integrate Defender for Cloud Apps with Corrata (Microsoft)
- Integrate Defender for Cloud Apps with iboss (Microsoft)
- Integrate Defender for Cloud Apps with Zscaler (Microsoft)
- Set up Cloud Discovery (Microsoft)
- Remediate app threats (Microsoft)
- Monitor and respond to apps with unusual data usage (Microsoft)
- Investigate anomaly detection alerts (Microsoft)
- Get started with app threat detection and remediation (Microsoft)
- Learn about app threat detection and remediation (Microsoft)
- Manage app policies (Microsoft)
- Create app policies (Microsoft)
- Get started with app policies (Microsoft)
- Learn about app policies (Microsoft)
- Determine your app compliance posture (Microsoft)
- View your apps (Microsoft)
- Get started with visibility and insights (Microsoft)
- Learn about visibility and insights (Microsoft)
- How to submit feedback on app governance (Microsoft)
- Get started with app governance (Microsoft)
- App governance add-on to Defender for Cloud Apps (Microsoft)
- Working with IP ranges and tags (Microsoft)
- Activity privacy (Microsoft)
- Scoped deployment (Microsoft)
- Importing user groups from connected apps (Microsoft)
- Email notification preferences (Microsoft)
- Manage admin access (Microsoft)
- Network requirements (Microsoft)
- Basic setup for Defender for Cloud Apps (Microsoft)
- Azure security baseline for Microsoft Defender for Cloud Apps
- How Defender for Cloud Apps helps protect your Zendesk (Preview) (Microsoft)
- How Defender for Cloud Apps helps protect your Workday environment (Microsoft)
- How Defender for Cloud Apps helps protect your Cisco Webex Teams environment (Microsoft)
- How Defender for Cloud Apps helps protect your Smartsheet (Microsoft)
- How Defender for Cloud Apps helps protect your Slack Enterprise (Microsoft)
- How Defender for Cloud Apps helps protect your ServiceNow environment (Microsoft)
- How Defender for Cloud Apps helps protect your Salesforce environment (Microsoft)
- How Defender for Cloud Apps helps protect your OneLogin (Microsoft)
- How Defender for Cloud Apps helps protect your Okta environment (Microsoft)
- How Defender for Cloud Apps helps protect your Office 365 environment (Microsoft)
- How Defender for Cloud Apps helps protect your Google Workspace environment (Microsoft)
- How Defender for Cloud Apps helps protect your NetDocuments (Microsoft)
- How Defender for Cloud Apps helps protect your Google Cloud Platform (GCP) environment (Microsoft)
- How Defender for Cloud Apps helps protect your GitHub Enterprise environment (Microsoft)
- How Defender for Cloud Apps helps protect your Dropbox environment (Microsoft)
- How Defender for Cloud Apps helps protect your Box environment (Microsoft)
- How Defender for Cloud Apps helps protect your Azure environment (Microsoft)
- How Defender for Cloud Apps helps protect your Amazon Web Services (AWS) environment (Microsoft)
- Protecting connected apps (Microsoft)
- Working with discovered apps (Microsoft)
- Working with App risk scores (Microsoft)
- Working with the app page (Microsoft)
- Working with the dashboard (Microsoft)
- Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control
- Tutorial: Require step-up authentication (authentication context) upon risky action (Microsoft)
- Tutorial: Automatically apply Microsoft Information Protection sensitivity labels
- Tutorial: Protect files with admin quarantine (Microsoft)
- Tutorial: Manage cloud platform security (Microsoft)
- Tutorial: Block download of sensitive information (Microsoft)
- Tutorial: Protect any apps in use in your organization in real time (Microsoft)
- Tutorial: Discover and protect sensitive information in your organization (Microsoft)
- Tutorial: Investigate and remediate risky OAuth apps (Microsoft)
- Tutorial: Investigate risky users (Microsoft)
- Defender for Cloud Apps best practices (Microsoft)
- Quickstart: Get started with Microsoft Defender for Cloud Apps
- What’s new in Microsoft Defender for Cloud Apps
- Microsoft Defender for Cloud Apps for US Government offerings
- Tutorial: Detect suspicious user activity with UEBA (Microsoft)
- Defender for Cloud Apps lifecycle management strategy (Microsoft)
- What are the differences between Microsoft Defender for Cloud Apps and Office 365 Cloud App Security?
- Tutorial: Discover and manage shadow IT in your network (Microsoft)
- What are the differences in discovery capabilities for Azure Active Directory and Microsoft Defender for Cloud Apps?
- What are Microsoft Defender for Cloud Apps data security and privacy practices?
- Microsoft Defender for Cloud Apps overview
- Microsoft Defender for Identity data security and privacy
- Microsoft Defender for Identity readiness guide
- Microsoft Defender for Identity frequently asked questions
- Microsoft Defender for Identity information and support
- Release reference of Microsoft Defender for Identity
- Troubleshooting Microsoft Defender for Identity Known Issues
- Microsoft Defender for Identity SIEM log reference
- Advanced Threat Analytics (ATA) to Microsoft Defender for Identity
- Uninstall the Microsoft Defender for Identity sensor
- Configuring Windows Event Forwarding (Microsoft)
- Configure event collection (Microsoft)
- Validate Port Mirroring (Microsoft)
- Configure port mirroring (Microsoft)
- Configure Microsoft Defender for Identity to make remote calls to SAM
- Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor
- Configure Microsoft Defender for Identity sensor settings
- Microsoft Defender for Identity switches and silent installation
- Integrate with Syslog (Microsoft)
- Integrate VPN (Microsoft)
- Troubleshooting Microsoft Defender for Identity sensor using the Defender for Identity logs
- Troubleshooting Microsoft Defender for Identity Known Issues
- Update Microsoft Defender for Identity sensors
- Understanding Microsoft Defender for Identity sensor health alerts
- Work with Microsoft Defender for Identity health and events
- Set Microsoft Defender for Identity notifications
- Change Microsoft Defender for Identity portal configuration – domain connectivity password
- Monitoring your domain controller coverage (Microsoft)
- Manage sensitive or honeytoken accounts (Microsoft)
- Configure detection exclusions (Microsoft)
- Microsoft Defender for Identity monitored activities search and filter
- Working with Security Alerts (Microsoft)
- Plan capacity for Microsoft Defender for Identity
- Understanding security alerts (Microsoft)
- Tutorial overview: Microsoft Defender for Identity security alert lab
- Security assessment: Weak cipher usage (Microsoft)
- Security assessment: Unsecure SID History attributes (Microsoft)
- Security assessment: Unmonitored domain controllers (Microsoft)
- Security assessment: Riskiest lateral movement paths (LMP) (Microsoft)
- Security assessment: Legacy protocols usage (Microsoft)
- Security assessment: Microsoft LAPS usage
- Security assessment: Dormant entities in sensitive groups (Microsoft)
- Security assessment: Entities exposing credentials in clear text (Microsoft)
- Security assessment: Domain controllers with Print spooler service available (Microsoft)
- Microsoft Defender for Identity’s identity security posture assessments
- Use activity filters and create action policies with Microsoft Defender for Identity in Microsoft Defender for Cloud Apps
- Using Microsoft Defender for Identity with Microsoft Defender for Cloud Apps
- Microsoft Defender for Identity multi-forest support
- Azure security baseline for Microsoft Defender for Identity
- Microsoft Defender for Identity role groups
- Microsoft Defender for Identity Reports
- What is Network Name Resolution? (Microsoft)
- Understanding entity profiles (Microsoft)
- Microsoft Defender for Identity Lateral Movement Paths (LMPs)
- Microsoft Defender for Identity monitored activities
- Microsoft Defender for Identity Security Alerts
- Working with the Microsoft Defender for Identity portal
- Tutorial: Use Lateral Movement Paths (LMPs) (Microsoft)
- Tutorial: Investigate an entity (Microsoft)
- Tutorial: Investigate a computer (Microsoft)
- Tutorial: Investigate a user (Microsoft)
- Tutorial: Exfiltration alerts (Microsoft)
- Tutorial: Lateral movement alerts (Microsoft)
- Tutorial: Compromised credential alerts (Microsoft)
- Tutorial: Reconnaissance alerts (Microsoft)
- Tutorial: Domain dominance alerts (Microsoft)
- Quickstart: Install the Microsoft Defender for Identity sensor
- Quickstart: Download the Microsoft Defender for Identity sensor setup package
- Quickstart: Connect to your Active Directory Forest (Microsoft)
- Quickstart: Create your Microsoft Defender for Identity instance
- What’s new in Microsoft Defender for Identity
- Microsoft Defender for Identity for US Government offerings
- Microsoft Defender for Identity in Microsoft 365 Defender
- Microsoft Defender for Identity prerequisites
- Microsoft Defender for Identity architecture
- What is Microsoft Defender for Identity?
- Understand threat intelligence concepts (Microsoft)
- Troubleshoot SIEM tool integration issues (Microsoft)
- Integrate your SIEM tools with Microsoft 365 Defender
- Fetch Microsoft 365 Defender incidents
- Get incident information API (Microsoft)
- Update incidents API (Microsoft)
- List incidents API in Microsoft 365 Defender
- Microsoft 365 Defender incidents API and the incidents resource type
- Microsoft 365 Defender Advanced hunting API
- Configure your Event Hub (Microsoft)
- Supported Microsoft 365 Defender streaming event types in event streaming API
- Configure Microsoft 365 Defender to stream Advanced Hunting events to your Storage account
- Configure Microsoft 365 Defender to stream Advanced Hunting events to your Azure Event Hub
- Streaming API (Microsoft)
- Common Microsoft 365 Defender REST API error codes
- Other security and threat protection APIs (Microsoft)
- Create an app to access Microsoft 365 Defender APIs on behalf of a user
- Create an app to access Microsoft 365 Defender without a user
- Hello World for Microsoft 365 Defender REST API
- Access the Microsoft 365 Defender APIs
- Microsoft 365 Defender APIs license and terms of use
- Supported Microsoft 365 Defender APIs
- Overview of Microsoft 365 Defender APIs
- Integrate ServiceNow tickets into the Microsoft 365 Defender portal and compliance center
- Provide managed security service provider (MSSP) access (Microsoft)
- Provide feedback on Microsoft 365 Defender
- Device profile page (Microsoft)
- Set the time zone for Microsoft 365 Defender
- Custom roles in role-based access control for Microsoft 365 Defender
- Manage access to Microsoft 365 Defender with Azure Active Directory global roles
- Create an app with partner access to Microsoft 365 Defender APIs
- Step 6. Identify SOC maintenance tasks (Microsoft)
- Step 5. Develop and test use cases (Microsoft)
- Step 4. Define Microsoft 365 Defender roles, responsibilities, and oversight
- Step 3. Plan for Microsoft 365 Defender integration with your SOC catalog of services
- Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework (Microsoft)
- Step 1. Plan for Microsoft 365 Defender operations readiness
- Integrating Microsoft 365 Defender into your security operations
- Configure and manage Microsoft Threat Experts capabilities through Microsoft 365 Defender
- Microsoft Threat Experts in Microsoft 365 overview
- Understand the analyst report in threat analytics in Microsoft 365 Defender
- Threat analytics in Microsoft 365 Defender
- Create and manage custom detections rules (Microsoft)
- Custom detections overview (Microsoft)
- FileProfile() (Microsoft)
- DeviceFromIP() (Microsoft)
- AssignedIPAddresses() (Microsoft)
- IdentityQueryEvents (Microsoft)
- IdentityLogonEvents (Microsoft)
- IdentityInfo (Microsoft)
- IdentityDirectoryEvents (Microsoft)
- EmailUrlInfo (Microsoft)
- EmailEvents (Microsoft)
- EmailPostDeliveryEvents (Microsoft)
- EmailAttachmentInfo (Microsoft)
- DeviceTvmSoftwareVulnerabilitiesKB (Microsoft)
- DeviceTvmSoftwareVulnerabilities (Microsoft)
- DeviceTvmSoftwareInventory (Microsoft)
- DeviceTvmSecureConfigurationAssessment (Microsoft)
- DeviceRegistryEvents (Miocrosoft)
- DeviceProcessEvents (Microsoft)
- DeviceNetworkInfo (Microsoft)
- DeviceNetworkEvents (Microsoft)
- DeviceLogonEvents (Microsoft)
- DeviceInfo (Microsoft)
- DeviceImageLoadEvents (Microsoft)
- DeviceFileEvents (Microsoft)
- DeviceFileCertificateInfo (Microsoft)
- DeviceEvents (Microsoft)
- CloudAppEvents (Microsoft)
- AlertInfo (Microsoft)
- AADSpnSignInEventsBeta (Microsoft)
- AlertEvidence (Microsoft)
- AADSignInEventsBeta (Microsoft)
- Advanced hunting schema – Naming changes (Microsoft)
- Understand the advanced hunting schema (Microsoft)
- Extend advanced hunting coverage with the right settings (Microsoft)
- Advanced hunting quotas and usage parameters (Microsoft)
- Handle advanced hunting errors (Microsoft)
- Advanced hunting query best practices (Microsoft)
- Link query results to an incident (Microsoft)
- Quickly hunt for entity or event information with go hunt (Microsoft)
- Take action on advanced hunting query results (Microsoft)
- Work with advanced hunting query results (Microsoft)
- Advanced hunting example for Microsoft Defender for Office 365
- Migrate advanced hunting queries from Microsoft Defender for Endpoint
- Hunt for ransomware (Microsoft)
- Hunt for threats across devices, emails, apps, and identities (Microsoft)
- Use shared queries in advanced hunting (Microsoft)
- Get expert training on advanced hunting (Microsoft)
- Learn the advanced hunting query language (Microsoft)
- Proactively hunt for threats with advanced hunting in Microsoft 365 Defender
- Address false positives or false negatives in Microsoft 365 Defender
- Details and results of an automated investigation (Microsoft)
- View and manage actions in the Action center (Microsoft)
- The Action center (Microsoft)
- Remediation actions in Microsoft 365 Defender
- Configure automated investigation and response capabilities in Microsoft 365 Defender
- Automated investigation and response in Microsoft 365 Defender
- Investigate alerts in Microsoft 365 Defender
- Incident response playbooks (Microsoft)
- Investigate incidents in Microsoft 365 Defender
- Example of an identity-based attack (Microsoft)
- Example of a phishing email attack (Microsoft)
- Step 3. Perform a post-incident review of your first incident (Microsoft)
- Step 2. Remediate your first incident (Microsoft)
- Step 1. Triage and analyze your first incident (Microsoft)
- Prepare your security posture for your first incident (Microsoft)
- Responding to your first incident (Microsoft)
- Manage incidents in Microsoft 365 Defender
- Prioritize incidents in Microsoft 365 Defender
- Incident response with Microsoft 365 Defender
- Investigate and respond with Microsoft 365 Defender
- Defender for Identity notifications in Microsoft 365 Defender
- Configure Defender for Identity detection exclusions in Microsoft 365 Defender (Preview)
- Defender for Identity security alerts in Microsoft 365 Defender
- Defender for Identity entity tags in Microsoft 365 Defender
- Defender for Identity VPN integration in Microsoft 365 Defender
- Microsoft Defender for Identity Directory Services account in Microsoft 365 Defender
- What’s new in Microsoft Secure Score
- What’s coming to Microsoft Secure Score
- Track your Microsoft Secure Score history and meet goals
- Assess your security posture with Microsoft Secure Score
- Microsoft Secure Score
- Frequently asked questions when turning on Microsoft 365 Defender
- Deploy supported services (Microsoft)
- Turn on Microsoft 365 Defender
- Promote your Microsoft 365 Defender evaluation environment to production
- Get started with Microsoft 365 Defender
- Try Microsoft 365 Defender incident response capabilities in a pilot environment
- Run an attack simulation in a Microsoft 365 Defender pilot environment
- Investigate and respond using Microsoft 365 Defender in a pilot environment
- Pilot Microsoft Defender for Cloud Apps with Microsoft 365 Defender
- Enable the evaluation environment for Microsoft Defender for Cloud Apps
- Evaluate Microsoft Defender for Cloud Apps
- Review architecture requirements and key concepts for Microsoft Defender for Cloud Apps
- Pilot Microsoft Defender for Office 365
- Enable the evaluation environment (Microsoft)
- Review Microsoft Defender for Office 365 architecture requirements and key concepts
- Enable and pilot Microsoft Defender for Office 365
- Pilot Microsoft Defender for Identity
- Enable the evaluation environment for Microsoft Defender for Identity
- Review architecture requirements and key concepts for Microsoft Defender for Identity
- Evaluate Microsoft Defender for Identity overview
- Create the Microsoft 365 Defender Evaluation Environment
- Evaluate and pilot Microsoft 365 Defender
- Microsoft security portals and admin centers
- Microsoft 365 Defender data security and privacy
- Microsoft 365 Defender prerequisites
- Top scoring in industry tests (Microsoft)
- Microsoft 365 Defender for US Government customers
- Microsoft 365 Defender integration with Microsoft Sentinel
- Redirecting accounts from Office 365 Security and Compliance Center to Microsoft 365 Defender
- Microsoft Defender for Office 365 in Microsoft 365 Defender
- What’s new in Microsoft 365 Defender
- Microsoft 365 Defender
- Migrating from a third-party HIPS to ASR rules (Microsoft)
- Troubleshoot attack surface reduction rules (Microsoft)
- Troubleshoot network protection (Microsoft)
- Troubleshoot service issues (Microsoft)
- Understand the client analyzer HTML report (Microsoft)
- Configure managed security service provider integration (Microsoft)
- Manage portal access using role-based access control (Microsoft)
- Integrate your SIEM tools with Microsoft Defender for Endpoint
- Raw Data Streaming API (Microsoft)
- Microsoft Power Automate (formerly Microsoft Flow), and Azure Functions
- Vulnerability resource type (Microsoft)
- User resource type (Microsoft)
- Software resource type (Microsoft)
- Score resource type (Microsoft)
- Remediation activity methods and properties (Microsoft)
- Recommendation resource type (Microsoft)
- MachineAction resource type (Microsoft)
- Machine resource type (Microsoft)
- Get IP related alerts API (Microsoft)
- Indicator resource type (Microsoft)
- File resource type (Microsoft)
- Get domain-related alerts API (Microsoft)
- Investigation resource type (Microsoft)
- Update alert (Microsoft)
- Export assessment methods and properties per device (Microsoft)
- Create alert API (Microsoft)
- Batch update alerts (Microsoft)
- List alerts API (Microsoft)
- Alert resource type (Microsoft)
- Advanced hunting API (Microsoft)
- Common REST API error codes (Microsoft)
- Overview of management and APIs (Microsoft)
- Understand threat intelligence concepts (Microsoft)
- Configure and manage Microsoft Threat Experts capabilities
- Microsoft Threat Experts (Microsoft)
- Automation levels in automated investigation and remediation capabilities (Microsoft)
- Overview of automated investigations (Microsoft)
- Alerts queue in Microsoft 365 Defender
- Can’t find Office applications in Windows 10, Windows 8, or Windows 7? (Microsoft)
- Troubleshoot installing Office (Microsoft)
- Windows 8 end of support and Office (Microsoft)
- Windows 7 end of support and Office (Microsoft)
- End of support for Office 2016 for Mac (Microsoft)
- End of support for Office 2010 (Microsoft)
- How do I upgrade Office? (Microsoft)
- Upgrade macOS to continue receiving Microsoft 365 and Office for Mac updates
- Update Office for Mac automatically (Microsoft)
- Install Office updates (Microsoft)
- Set up Office apps and email on a mobile device (Microsoft)
- Install Skype for Business (Microsoft)
- Install Visio or access Visio for the web (Microsoft)
- Install Project (Microsoft)
- Use the Office offline installer (Microsoft)
- Choose between the 64-bit or 32-bit version of Office (Microsoft)
- Language Accessory Pack for Office (Microsoft)
- Activate Office 2010 (Microsoft)
- Activate Office for Mac (Microsoft)
- Unlicensed Product and activation errors in Office (Microsoft)
- Deactivate an installation of Office (Microsoft)
- Activate Office (Microsoft)
- Find your product key for Office 2010 (Microsoft)
- Change your Office product key (Microsoft)
- Using product keys with Office (Microsoft)
- Where to enter your Office product key (Microsoft)
- Redeem a product key or activate Office (Microsoft)
- Install Office 2010 (Microsoft)
- Download and install or reinstall Office 2019, Office 2016, or Office 2013
- Download and install or reinstall Microsoft 365 or Office 2021 on a PC or Mac
- Docker on Windows on-premises (Microsoft)
- Configure Windows Event collection (Microsoft)
- Data collection for advanced troubleshooting on Windows (Microsoft)
- Run the client analyzer on Windows (Microsoft)
- Run the client analyzer on macOS and Linux (Microsoft)
Microsoft for Enpoint
- Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud Apps
- Tutorial: Extend governance to endpoint remediation (Microsoft)
- Integrate Microsoft Defender for Identity with Microsoft Defender for Endpoint
- Pilot Microsoft Defender for Endpoint
- Enable Microsoft Defender for Endpoint evaluation environment
- Evaluate Microsoft Defender for Endpoint overview
- Review Microsoft Defender for Endpoint architecture requirements and key concepts
- Redirecting accounts from Microsoft Defender for Endpoint to Microsoft 365 Defender
- Microsoft Defender for Endpoint in Microsoft 365 Defender
- Collect support logs in Microsoft Defender for Endpoint using live response
- Troubleshoot Microsoft Defender for Endpoint live response issues
- Contact Microsoft Defender for Endpoint support
- Check the Microsoft Defender for Endpoint service health
- Provide feedback on the Microsoft Defender for Endpoint client analyzer tool
- Download the Microsoft Defender for Endpoint client analyzer
- Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
- Fix unhealthy sensors in Microsoft Defender for Endpoint
- Check sensor health state in Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint and other Microsoft solutions
- Partner applications in Microsoft Defender for Endpoint
- Supported Microsoft Defender for Endpoint APIs
- Use Microsoft Defender for Endpoint APIs
- Create an app to access Microsoft Defender for Endpoint without a user
- Microsoft Defender for Endpoint API – Hello World
- Access the Microsoft Defender for Endpoint APIs
- Microsoft Defender for Endpoint API license and terms of use
- Microsoft Defender for Endpoint API release notes
- Configure Microsoft Defender for Cloud Apps in Microsoft Defender for Endpoint
- Configure Conditional Access in Microsoft Defender for Endpoint
- Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint
- Endpoint detection and response (EDR) in block mode (Microsoft)
- The analyst report in threat analytics (Microsoft)
- Track and respond to emerging threats through threat analytics (Microsoft)
- DeviceAlertEvents (Microsoft)
- Understand the advanced hunting schema in Microsoft Defender for Endpoint
- Proactively hunt for threats with advanced hunting (Microsoft)
- Device health and compliance report in Microsoft Defender for Endpoint
- Threat protection report in Microsoft Defender for Endpoint
- Create custom reports using Power BI (Microsoft)
- Use sensitivity labels to prioritize incident response (Microsoft)
- Live response command examples (Microsoft)
- Investigate entities on devices using live response (Microsoft)
- Visit the Action center to see remediation actions (Microsoft)
- Review remediation actions following an automated investigation (Microsoft)
- Take response actions on a device (Microsoft)
- Create and manage device tags (Microsoft)
- Microsoft Defender for Endpoint device timeline event flags
- View and organize the Microsoft Defender for Endpoint Devices list
- Investigate a user account in Microsoft Defender for Endpoint
- Investigate connection events that occur behind forward proxies (Microsoft)
- Investigate a domain associated with a Microsoft Defender for Endpoint alert
- Investigate an IP address associated with a Microsoft Defender for Endpoint alert
- Investigate devices in the Microsoft Defender for Endpoint Devices list
- Investigate a file associated with a Microsoft Defender for Endpoint alert
- Manage Microsoft Defender for Endpoint alerts
- Investigate alerts in Microsoft Defender for Endpoint
- Review alerts in Microsoft Defender for Endpoint
- View and organize the Microsoft Defender for Endpoint Alerts queue
- Investigate incidents in Microsoft Defender for Endpoint
- Manage Microsoft Defender for Endpoint incidents
- View and organize the Microsoft Defender for Endpoint Incidents queue
- Microsoft Defender Security Center Security operations dashboard
- Overview of endpoint detection and response (Microsoft)
- Optimize ASR rule deployment and detections (Microsoft)
- Increase compliance to the Microsoft Defender for Endpoint security baseline
- Address false positives/negatives in Microsoft Defender for Endpoint
- Feedback-loop blocking (Microsoft)
- Client behavioral blocking (Microsoft)
- Behavioral blocking and containment (Microsoft)
- Device control report (Microsoft)
- Device Control Printer Protection (Microsoft)
- Microsoft Defender for Endpoint Device Control Device Installation
- Microsoft Defender for Endpoint Device Control Removable Storage Access Control
- Microsoft Defender for Endpoint Device Control Removable Storage Protection (Microsoft)
- Customize controlled folder access (Microsoft)
- Enable controlled folder access (microsoft)
- Evaluate controlled folder access (Microsoft)
- Protect important folders with controlled folder access (Microsoft)
- Web content filtering (Microsoft)
- Respond to web threats (Microsoft)
- Monitor web browsing security (Microsoft)
- Protect your organization against web threats (Microsoft)
- Web protection (Microsoft)
- Turn on network protection (Microsoft)
- Evaluate network protection (Microsoft)
- Protect your network (Microsoft)
- Exploit Protection Reference (MicrosofT)
- Import, export, and deploy exploit protection configurations (Microsoft)
- Customize exploit protection (Microsoft)
- Enable exploit protection (Microsoft)
- Evaluate exploit protection (Microsoft)
- Protect devices from exploits (Microsoft)
- Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution
- Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus
- Troubleshoot performance issues related to real-time protection (Microsoft)
- Troubleshoot Microsoft Defender Antivirus reporting in Update Compliance
- Common mistakes to avoid when defining exclusions (Microsoft)
- Configure Microsoft Defender Antivirus exclusions on Windows Server
- Configure exclusions for files opened by processes (Microsoft)
- Configure and validate exclusions based on file extension and folder location (Microsoft)
- Configure and validate exclusions for Microsoft Defender Antivirus scans
- Restore quarantined files in Microsoft Defender Antivirus
- Configure Microsoft Defender Antivirus scanning options
- Run and review the results of a Microsoft Defender Offline scan
- Configure and run on-demand Microsoft Defender Antivirus scans
- Review Microsoft Defender Antivirus scan results
- Report on Microsoft Defender Antivirus
- Deployment guide for Microsoft Defender Antivirus in a virtual desktop infrastructure (VDI) environment
- Deploy and enable Microsoft Defender Antivirus
- Deploy, manage, and report on Microsoft Defender Antivirus
- Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings
- Configure Microsoft Defender Antivirus notifications that appear on endpoints
- Configure and manage Microsoft Defender Antivirus with the mpcmdrun.exe command-line tool
- Use PowerShell cmdlets to configure and manage Microsoft Defender Antivirus
- Use Windows Management Instrumentation (WMI) to configure and manage Microsoft Defender Antivirus
- Manage Microsoft Defender Antivirus updates and scans for endpoints that are out of date
- Manage updates for mobile devices and virtual machines (VMs) (Microsoft)
- Use Group Policy settings to configure and manage Microsoft Defender Antivirus
- Manage Microsoft Defender Antivirus in your business
- Use Microsoft Endpoint Manager to configure and manage Microsoft Defender Antivirus
- Create a custom gradual rollout process for Microsoft Defender updates
- Manage event-based forced updates (Microsoft)
- Manage the schedule for when protection updates should be downloaded and applied (Microsoft)
- Manage the gradual rollout process for Microsoft Defender updates
- Manage the sources for Microsoft Defender Antivirus protection updates
- Manage Microsoft Defender Antivirus updates and apply baselines
- Microsoft Defender Antivirus compatibility with other security products
- Performance analyzer for Microsoft Defender Antivirus
- Use limited periodic scanning in Microsoft Defender Antivirus
- Schedule antivirus scans using Windows Management Instrumentation (WMI) (Microsoft)
- Schedule antivirus scans using PowerShell (Microsoft)
- Schedule antivirus scans using Group Policy (Microsoft)
- Configure scheduled quick or full Microsoft Defender Antivirus scans
- Configure remediation for Microsoft Defender Antivirus detections
- Enable and configure Microsoft Defender Antivirus always-on protection in Group Policy
- Detect and block potentially unwanted applications (Microsoft)
- Configure behavioral, heuristic, and real-time protection (Microsoft)
- Configure the cloud block timeout period (Microsoft)
- Turn on block at first sight (Microsoft)
- Protect security settings with tamper protection (Microsoft)
- Configure and validate Microsoft Defender Antivirus network connections
- Cloud protection and sample submission in Microsoft Defender Antivirus
- Specify the cloud protection level (Microsoft)
- Turn on cloud protection in Microsoft Defender Antivirus
- Why cloud protection should be enabled for Microsoft Defender Antivirus
- Cloud protection and Microsoft Defender Antivirus
- Configure Microsoft Defender Antivirus features
- Evaluate Microsoft Defender Antivirus
- Better together: Microsoft Defender Antivirus and Office 365
- Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint
- Microsoft Defender Antivirus in Windows
- Next-generation protection overview (Microsoft)
- Attack surface reduction frequently asked questions (FAQ) (Microsoft)
- Customize attack surface reduction rules (Microsoft)
- Enable attack surface reduction rules (Microsoft)
- Evaluate attack surface reduction rules (Microsoft)
- Attack surface reduction rules (Microsoft)
- Attack surface reduction rules deployment phase 4: operationalize (Microsoft)
- Attack surface reduction rules deployment phase 3: implement (Microsoft)
- Attack surface reduction rules deployment phase 2: test (Microsoft)
- Attack surface reduction rules deployment phase 1: plan (Microsoft)
- Attack surface reduction rules deployment guide (Microsoft)
- Use attack surface reduction rules to prevent malware infection (Microsoft)
- Understand and use attack surface reduction capabilities (Microsoft)
- Host firewall reporting in Microsoft Defender for Endpoint
- Device discovery frequently asked questions
- Enable Corelight data integration (Microsoft)
- Enable Microsoft Defender for IoT integration
- Configure device discovery (Microsoft)
- Device discovery overview (Microsoft)
- Hunt for exposed devices – threat and vulnerability management (Microsoft)
- Vulnerable devices report – threat and vulnerability management (Microsoft)
- Event timeline – threat and vulnerability management (Microsoft)
- Vulnerabilities in my organization – threat and vulnerability management (Microsoft)
- Software inventory – threat and vulnerability management (Microsoft)
- Mitigate zero-day vulnerabilities – threat and vulnerability management (Microsoft)
- Plan for end-of-support software and software versions with threat and vulnerability management (Microsoft)
- Create and view exceptions for security recommendations – threat and vulnerability management (Microsoft)
- Remediate vulnerabilities with threat and vulnerability management (Microsoft)
- Security recommendations – threat and vulnerability management (Microsoft)
- Microsoft Secure Score for Devices
- Exposure score – threat and vulnerability management (Microsoft)
- Dashboard insights – threat and vulnerability management (Microsoft)
- Assign device value – threat and vulnerability management (Microsoft)
- Supported operating systems, platforms and capabilities – for threat and vulnerability management (Microsoft)
- Prerequisites & permissions – threat and vulnerability management (Microsoft)
- Threat and vulnerability management (Microsoft)
- Microsoft 365 Defender time zone settings
- Get devices onboarded to Microsoft Defender for Endpoint
- Ensure your devices are configured properly (Microsoft)
- Offboard devices from the Microsoft Defender for Endpoint service
- Onboard devices and configure Microsoft Defender for Endpoint capabilities (Microsoft)
- Manage automation folder exclusions (Microsoft)
- Manage automation file uploads (Microsoft)
- Create indicators based on certificates (Microsoft)
- Manage indicators (Microsoft)
- Create indicators for IPs and URLs/domains (Microsoft)
- Create indicators for files (Microsoft)
- Create indicators (Microsoft)
- Manage suppression rules (Microsoft)
- Create and manage device tags (Microsoft)
- Create and manage device groups (Microsoft)
- Create and manage roles for role-based access control (Microsoft)
- Manage portal access using role-based access control (Microsoft)
- Use basic permissions to access the portal (Microsoft)
- Configure advanced features in Defender for Endpoint (Microsoft)
- Configure vulnerability email notifications in Microsoft Defender for Endpoint
- Configure alert notifications in Microsoft Defender for Endpoint
- Verify data storage location and update data retention settings for Microsoft Defender for Endpoint
- Configure Microsoft Defender Security Center settings
- Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint
- Troubleshoot Microsoft Defender for Endpoint onboarding issues
- Troubleshoot subscription and portal access issues (Microsoft)
- Manage Microsoft Defender for Endpoint configuration settings on devices with Microsoft Endpoint Manager
- Microsoft Defender for Endpoint application license terms
- Privacy information – Microsoft Defender for Endpoint on iOS
- Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
- Configure Microsoft Defender for Endpoint on iOS features
- What’s new in Microsoft Defender for Endpoint on iOS
- Microsoft Defender for Endpoint on iOS
- Troubleshooting issues on Microsoft Defender for Endpoint on Android
- Microsoft Defender for Endpoint on Android – Privacy information
- Configure Microsoft Defender for Endpoint risk signals using App Protection Policies (MAM)
- Configure Defender for Endpoint on Android features (Microsoft)
- Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
- What’s new in Microsoft Defender for Endpoint on Android
- Microsoft Defender for Endpoint on Android
- Microsoft Defender for Endpoint – Mobile Threat Defense
- Resources (Microsoft)
- Privacy for Microsoft Defender for Endpoint on Linux
- Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux
- Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux
- Troubleshoot issues for Microsoft Defender for Endpoint on Linux RHEL6
- Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux
- Investigate agent health issues (Microsoft)
- Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux
- Schedule an update of the Microsoft Defender for Endpoint (Linux)
- Schedule scans with Microsoft Defender for Endpoint (Linux)
- Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on Linux
- Set preferences for Microsoft Defender for Endpoint on Linux
- Configure Microsoft Defender for Endpoint on Linux for static proxy discovery
- Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
- Deploy updates for Microsoft Defender for Endpoint on Linux
- Deploy Defender for Endpoint on Linux with Chef (Microsoft)
- Deploy Microsoft Defender for Endpoint on Linux with Ansible
- Deploy Microsoft Defender for Endpoint on Linux with Puppet
- Deploy Microsoft Defender for Endpoint on Linux manually
- What’s new in Microsoft Defender for Endpoint on Linux
- Microsoft Defender for Endpoint on Linux
- Microsoft Defender ATP application license terms
- Resources for Microsoft Defender for Endpoint on macOS
- Privacy for Microsoft Defender for Endpoint on macOS
- Troubleshoot license issues for Microsoft Defender for Endpoint on macOS
- Troubleshoot kernel extension issues in Microsoft Defender for Endpoint on macOS
- Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS
- Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
- Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS
- Schedule scans with Microsoft Defender for Endpoint on macOS
- Examples of device control policies for Intune (Microsoft)
- Examples of device control policies for JAMF (Microsoft)
- Device control for macOS (Microsoft)
- Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on macOS
- Set preferences for Microsoft Defender for Endpoint on macOS
- Configure and validate exclusions for Microsoft Defender for Endpoint on macOS
- Deploy updates for Microsoft Defender for Endpoint on macOS
- Manual deployment for Microsoft Defender for Endpoint on macOS
- Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint on macOS
- Enroll Microsoft Defender for Endpoint on macOS devices into Jamf Pro
- Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
- Set up Microsoft Defender for Endpoint on macOS device groups in Jamf Pro
- Log in to Jamf Pro (Microsoft)
- Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro
- Intune-based deployment for Microsoft Defender for Endpoint on macOS
- What’s new in Microsoft Defender for Endpoint on Mac
- Microsoft Defender for Endpoint on Mac
- Onboard non-Windows devices (Microsoft)
- Microsoft Defender Preview application license terms
- Create a notification rule when a local onboarding or offboarding script is used (Microsoft)
- Configure device proxy and Internet connectivity settings (Microsoft)
- Experience Microsoft Defender for Endpoint through simulated attacks
- Run a detection test on a newly onboarded Microsoft Defender for Endpoint device
- Onboard devices without Internet access to Microsoft Defender for Endpoint
- Integration with Microsoft Defender for Cloud
- Onboarding tools and methods for Windows devices in Defender for Endpoint (Microsoft)
- Manage Microsoft Defender for Endpoint with Group Policy Objects
- Manage Microsoft Defender for Endpoint with PowerShell, WMI, and MPCmdRun.exe
- Manage Microsoft Defender for Endpoint with Configuration Manager
- Manage Microsoft Defender for Endpoint with Intune
- Manage Microsoft Defender for Endpoint, post migration
- Troubleshooting issues when switching to Microsoft Defender for Endpoint
- Switch to Microsoft Defender for Endpoint – Phase 3: Onboard
- Switch to Microsoft Defender for Endpoint – Phase 2: Setup
- Switch to Microsoft Defender for Endpoint – Phase 1: Prepare
- Make the switch from non-Microsoft endpoint protection to Microsoft Defender for Endpoint
- Make the switch to Microsoft Defender for Endpoint
- Onboarding using Microsoft Endpoint Manager
- Onboarding using Microsoft Endpoint Configuration Manager
- Deploy Microsoft Defender for Endpoint in rings
- Onboard to the Microsoft Defender for Endpoint service
- Set up Microsoft Defender for Endpoint deployment
- Prepare Microsoft Defender for Endpoint deployment
- Deployment phases (Microsoft)
- Plan your Microsoft Defender for Endpoint deployment
- Microsoft Defender for Endpoint evaluation lab
- Microsoft Defender for Endpoint for non-Windows platforms
- Microsoft Defender for Endpoint for US Government customers
- Manage Microsoft Defender for Endpoint Plan 1
- Get started with Microsoft Defender for Endpoint Plan 1
- Set up and configure Microsoft Defender for Endpoint Plan 1
- Overview of Microsoft Defender for Endpoint Plan 1
- Set up and configure Microsoft Defender for Endpoint Plan 1
- Microsoft 365 Defender portal overview
- Overview of Microsoft Defender Security Center
- Microsoft Defender for Endpoint data storage and privacy
- Microsoft Defender for Endpoint preview features
- What’s new in Microsoft Defender for Endpoint
- Minimum requirements for Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint Plan 1 and Plan 2 (Microsoft)
- Microsoft Defender for Endpoint (Microsoft)
- Uninstall Office for Mac (Microsoft)
- Uninstall Office from a PC (Microsoft)
- Office is taking long to install (Microsoft)
Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team
(Visited 80 times, 1 visits today)