As attackers become increasingly aggressive nowadays, the workload for defenders (the blue team) is growing, with the need to juggle internal operations and protection while also ensuring user endpoint security and defending against sensitive information leaks resulting from successful social engineering attacks. How can we use Microsoft Defender to reduce our burden and leverage the collaborative defense features of various protection mechanisms, implement effective SOAR, and adapt to modern working patterns in order to enhance our defense capabilities? We have designed scenarios involving malicious programs, identity theft, ransomware, and sensitive data tracking. These scenarios enable you to experience how Microsoft's modernized security work surface can help you quickly conduct effective inventory assessments, vulnerability scans, and automatic protection, achieving comprehensive protection, fearless transformation, and effective construction of zero trust!
In addition to the well-known "Defender Three Brothers", Microsoft Defender has also increasingly integrated horizontal services, including endpoint, identity, network behavior, etc. If you are unsure about how to implement a zero trust detection and protection solution, this workshop's scenarios covering endpoint detection, AD protection, and user behavior will help you understand the modern management and zero trust resilience that Defender can provide.
Introduction of Defender for Endpoint, Identity, CloudAppSecurity
Hands-on exercises 1: How to deploy MDE and implement detection of malicious behavior
Hands-on exercises 2: How to deploy MDI and implement detection of attacks and identity theft
Hands-on exercises 3: How to enable MDCAS and implement detection of malicious encryption behavior.
20
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .