Side Quest - Defender For Endpoint #Episode 2
Topics Covered: Setting Up Microsoft Defender for Endpoint
In this Side Quest article we will be performing the following activities to configure the Defender for Endpoint from Scratch and get it up and running.
Pre-Requisites:
Activity 1: Setup Defender for Endpoint
In this activity, you will perform the initialization of the Microsoft Defender for the Endpoint portal.
Note: If you do not see the options, please wait for 10-15 minutes to reflect the options.
If the Device monitoring is being turned on then click on OK
Go back to Microsoft Defender portal, from the left-navigation menu, select Settings.
Note: If you do not see the Device Discovery option under Settings, log out by selecting the top-right circle with your account initials and choose Sign Out. Open the page in private mode (InPrivate) and afterwards, log in again using the Tenant Email credentials or other options to consider are refreshing the page. It might take 60-70 minutes to reflect the option on portal. Check after 10-15 mins interval for the option in the defender portal.
Note: If you do not see the option, refresh the page, and wait for 10-15 minutes.
Activity 2: Configure Roles
Recommended by LinkedIn
In the Add role dialog enter the following, and select Next:
Role name : Onboarding Specialist Group
Permissions: Live Response capabilities > Advanced
On the Add role page, select Defender Onboarding Group and then select Add selected groups. Make sure it appears under Azure AD user groups with this role.
Activity 3: Configure Device Groups
In this Activity , you will configure device groups that allow for access control and automation configuration.
Enter the following information on the General tab and select Next (3).
General setting: Value
Device group name: Regular Monitoring
Remediation level: Full-remediate threats automatically.
Activity 4: Create Baseline Policies
In this Activity, your objective is to implement the Windows Intune security baseline, which offers a comprehensive set of recommended settings essential for securely configuring devices running Windows. This includes configuring browser settings, PowerShell configurations, and specific settings for security features such as Microsoft Defender Antivirus.
In the next article, we'll go over On-boarding device to Defender.
#DefenderforEndpoint #Cybersecurity #EndpointSecurity #MicrosoftSecurity #ZeroTrust #ThreatProtection #EndpointManagement #AdvancedThreatProtection #SecureTheEndpoint #SecuritySolutions #SecOps #InfoSec #CyberDefense #DigitalDefense#MicrosoftIntune #azurecloud #cloudcomputingservices#m365 #saas #Modernworkplaceengineer #EnterpriseSecurity #itinfrastructuremanagement #modernworkplace #digitalworkplace #ITSecurity #technologyisawesome #learningandgrowing #linkedinconnections #linkedincommunity #like #share #support