Important
Microsoft Defender for Business is now in preview, and will roll out gradually to customers and IT Partners who sign-up here to request it. We will onboard an initial set of customers and partners in the coming weeks and will expand the preview leading up to general availability. Note that preview will launch with an initial set of scenarios, and we will be adding capabilities regularly.
Some information in this article relates to prereleased products/services that might be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, for the information provided here.
If you’ve just finished setting up Microsoft Defender for Business (preview), you might be wondering where to start to learn about how Defender for Business (preview) works. This article describes preview scenarios to try, and several tutorials and simulations that are available for Defender for Business (preview). These resources are designed to help you see how Defender for Business (preview) can work for your company.
Try these preview scenarios
The following table summarizes several scenarios to try during the preview of Defender for Business (preview).
Scenario | Description |
---|---|
Onboard devices using a local script | In Defender for Business (preview), you can onboard Windows 10 and 11 devices using a script that you download and run on each device. The script creates a trust with Azure Active Directory (Azure AD) and enrolls the device with Microsoft Intune. To learn more, see Onboard a device using a local script in Defender for Business (preview). |
Onboard devices using Microsoft Intune | If you were already using Microsoft Intune before getting Defender for Endpoint, you can use Microsoft Intune to onboard devices. Try onboarding macOS, iOS, Linux, and Android devices with Microsoft Intune. To learn more, see Device enrollment in Microsoft Intune. |
Edit security policies and settings | If you’re managing your security policies and settings in Defender for Business (preview), use the Device configuration page to view and edit your policies. To learn more, see View or edit policies in Microsoft Defender for Business (preview). |
Execute a simulated attack | Several tutorials and simulations are available in Defender for Business (preview). These tutorials and simulations are designed to show you firsthand how the threat protection features of Defender for Business (preview) can work for your company. To try one or more of the tutorials, see Recommended tutorials for Microsoft Defender for Business (preview). |
View incidents in Microsoft 365 Lighthouse | If you are a Microsoft Cloud Solution Provider using Microsoft 365 Lighthouse, you will be able to view incidents across your customers’ tenants in your Microsoft 365 Lighthouse portal soon. To learn more, see Microsoft 365 Lighthouse and Microsoft Defender for Business (preview). |
Recommended tutorials for Defender for Business
The following table describes the recommended tutorials for Defender for Business (preview) customers:
Tutorial | Description |
---|---|
Document drops backdoor | Simulate an attack that introduces file-based malware on a test device. The tutorial describes how to get and use the simulation file, and what to watch for in the Microsoft 365 Defender portal.
This tutorial requires Microsoft Word to be installed on your test device. |
Live Response tutorial | Learn how to use basic and advanced commands with Live Response. Learn how to locate a suspicious file, remediate the file, and gather information on a device. |
Threat & Vulnerability Management (core scenarios) | Learn about threat and vulnerability management through three scenarios:
1. Reduce your organization’s threat and vulnerability exposure. Threat and vulnerability management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. |
Each tutorial includes a walkthrough document that explains the scenario, how it works, and what to do.
Tip
You’ll see references to Microsoft Defender for Endpoint in the walkthrough documents. The tutorials listed in this article can be used with either Defender for Endpoint or Defender for Business (preview).
How to access the tutorials
- Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in.
- In the navigation pane, under Endpoints, choose Tutorials.
- Choose one of the following tutorials:
- Document drops backdoor
- Live Response tutorial
- Threat & Vulnerability Management (core scenarios)