Welcome to Microsoft Defender for Endpoint – From Zero to Hero, Module 1.1. Minimum requirements and licensing Before deploying Defender for Endpoint is important to review the requirements for licensing, hardware, OS and key configuration. In this video you will see: 1 - Licensing 2 - Hardware 3 - Windows versions and operating systems 4 - Browser 5 - Internet connectivity 6 - Data storage 7 - Configuration ***COURSE OUTLINE*** I have plans to record 20+ videos and the course outline is not set in stone. Below are the modules already available and the ones on the horizon: 1. Product Overview - 1.1 - Minimum requirements and licensing - 2 - Design & key decisions 2.1 Design: MDE settings deployment - 2.3 - Design - Best practise for full scan - Device tag overview - Deploying device tag via portal, GPO and Intune - - Device auto-tagging via Logic Apps - 3 - MDE deployment 3.1 - Initial setup and advanced settings - 3.2 - Deploying settings via MEM - 3.3 - Deploying settings via GPO - 4 - Onboarding 4.1 - Onboarding overview - 4.2 - Onboarding via GPO and local script - 4.3 - Onboarding via Microsoft Endpoint Manager - 4.4 - Onboarding via helper script - 4.5 - Auto Onboarding via Defender for Cloud 5 - Migration from 3rd party solution - 6 - Monitoring 6.1 - Alerts and incidents management - 6.2 - Ransomware attack investigation - 6.3 - Dealing with Ransomware via Sentinel automation - 7 - Integration with SIEM (Security Information and Event Management) 8 - Troubleshooting 8.1 - Troubleshooting mode deep dive - 8.2 - Troubleshooting PowerShell output issue - My Microsoft Defender for Endpoint – From Zero to Hero playlist can be accessed from Please consider subscribing to my channel for the latest updates and upcoming modules. Thanks for supporting this project, I hope you enjoy and learn a lot Thanks for watching Jackson Felden #MicrosoftDefenderForEndpoint #MDE #CyberSecurity









