With the threat of malicious users or malware ever increasing. It’s now more important than ever that organisations are protected. This time I take a look at Microsoft Defender for Endpoint and talk about what it is and how it works. As always I welcome your feedback and any questions. Please like and share. Many thanks.
Timecodes
00:00 Introduction
01:33 Configuring Defender for Endpoint
02:49 Defender for Endpoint interface walkthrough
03:13 Defender for Endpoint New Interface
03:46 Defender for Endpoint Device Inventory
06:24 Defender for Endpoint Settings
08:34 Defender for Endpoint Device Search
09:06 Defender for Endpoint Managing Device information & settings
11:45 Defender for Endpoint Threat & Venerability Dashboard
12:54 Defender for Endpoint Software Inventory
13:55 Defender for Endpoint Working with partner software & services
14:39 Defender for Endpoint Evaluation Lab
14:48 Defender for Endpoint Configuration Manager
18:27 Defender for Endpoint Threat Analytics
19:08 Defender for Endpoint Device health & Compliance
23:14 Session review
Please visit me at https://www.Andymalone.org
microsoft defender for endpointmicrosoft securityadministering microsoft defender for endpoint















