Investigate and respond using Microsoft 365 Defender in a pilot environment 0 (0)

This article outlines the process to create incidents with attack simulations and tutorials and use Microsoft 365 Defender to investigate and respond. Before starting this process, be sure you’ve reviewed the overall process for evaluating Microsoft 365 Defender and you have created the Microsoft 365 Defender evaluation environment. Use the following steps. The following table describes the steps […]

Read More

Pilot Microsoft Defender for Cloud Apps with Microsoft 365 Defender 0 (0)

This article is Step 3 of 3 in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps. For more information about this process, see the overview article. Use the following steps to set up and configure the pilot for Microsoft Defender for Cloud Apps. Step 1. Create the pilot group — Scope your pilot […]

Read More

Enable the evaluation environment for Microsoft Defender for Cloud Apps 0 (0)

This article is Step 2 of 2 in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps. For more information about this process, see the overview article. This article walks you through the process of accessing the Defender for Cloud Apps portal and configuring the necessary integration to collect cloud app traffic data. […]

Read More

Evaluate Microsoft Defender for Cloud Apps 0 (0)

Applies to: Microsoft 365 Defender This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. Before starting this process, be sure you’ve reviewed the overall process for evaluating Microsoft 365 Defender and you have created the Microsoft 365 Defender evaluation environment. Use the following steps to enable and pilot Microsoft […]

Read More

Pilot Microsoft Defender for Endpoint 0 (0)

This article will guide you in the process of running a pilot for Microsoft Defender for Endpoint. Use the following steps to setup and configure the pilot for Microsoft Defender for Endpoint. Step 1. Verify pilot group Step 2. Try out capabilities When you pilot Microsoft Defender for Endpoint, you may choose to onboard a […]

Read More

Enable Microsoft Defender for Endpoint evaluation environment 0 (0)

 Tip Microsoft Defender for Endpoint also comes with an in-product evaluation lab where you can add pre-configured devices and run simulations to evaluate the capabilities of the platform. The lab comes with a simplified set-up experience that can help quickly demonstrate the value of Microsoft Defender for Endpoint including guidance for many features like advanced […]

Read More

Review Microsoft Defender for Endpoint architecture requirements and key concepts 0 (0)

Applies to: Microsoft 365 Defender This article will guide you in the process of setting up the evaluation for Microsoft Defender for Endpoint environment. For more information about this process, see the overview article. Before enabling Microsoft Defender for Endpoint, be sure you understand the architecture and can meet the requirements. Understand the architecture The following diagram […]

Read More

Evaluate Microsoft Defender for Endpoint overview 0 (0)

This article outlines the process to enable and pilot Microsoft Defender for Endpoint. Before starting this process, be sure you’ve reviewed the overall process for evaluating Microsoft 365 Defender and you have created the Microsoft 365 Defender evaluation environment. Use the following steps to enable and pilot Microsoft Defender for Endpoint. The following table describes the steps in […]

Read More

Pilot Microsoft Defender for Office 365 0 (0)

This article is Step 3 of 3 in the process of setting up the evaluation environment for Microsoft Defender for Office 365. For more information about this process, see the overview article. Use the following steps to setup and configure the pilot for Microsoft Defender for Office 365. Step 1: Create pilot groups Step 2: Configure protection Step […]

Read More