| Topic | Details |
| Mitigate threats using Microsoft 365 Defender (25-30%) | |
| Detect, investigate, respond, and remediate threats to the productivity environment by using Microsoft Defender for Office 365 | - detect, investigate, respond, and remediate threats to Microsoft Teams, SharePoint, and OneDrive - detect, investigate, respond, remediate threats to email by using Defender for Office 365 - manage data loss prevention policy alerts - assess and recommend sensitivity labels - assess and recommend insider risk policies |
| Detect, investigate, respond, and remediate endpoint threats by using Microsoft Defender for Endpoint | - manage data retention, alert notification, and advanced features - configure device attack surface reduction rules - configure and manage custom detections and alerts - respond to incidents and alerts - manage automated investigations and remediations - assess and recommend endpoint configurations to reduce and remediate vulnerabilities by using the Microsoft¡¯s threat and vulnerability management solution. - manage Microsoft Defender for Endpoint threat indicators - analyze Microsoft Defender for Endpoint threat analytics |
| Detect, investigate, respond, and remediate identity threats | - identify and remediate security risks related to sign-in risk policies - identify and remediate security risks related to Conditional Access events - identify and remediate security risks related to Azure Active Directory - identify and remediate security risks using Secure Score - identify, investigate, and remediate security risks related to privileged identities - configure detection alerts in Azure AD Identity Protection - identify and remediate security risks related to Active Directory Domain Services using Microsoft Defender for Identity |
| Detect, investigate, respond, and remediate application threats | - identify, investigate, and remediate security risks by using Microsoft Defender for Cloud Apps - configure Microsoft Defender for Cloud Apps to generate alerts and reports to detect threats |
| Manage cross-domain investigations in Microsoft 365 Defender portal | - manage incidents across Microsoft 365 Defender products - manage actions pending approval across products - perform advanced threat hunting |
| Mitigate threats using Microsoft Defender for Cloud (25-30%) | |
| Design and configure a Microsoft Defender for Cloud implementation | - plan and configure Microsoft Defender for Cloud settings, including selecting target subscriptions and workspace - configure Microsoft Defender for Cloud roles - configure data retention policies - assess and recommend cloud workload protection |
| Plan and implement the use of data connectors for ingestion of data sources in Microsoft Defender for Cloud | - identify data sources to be ingested for Microsoft Defender for Cloud - configure automated onboarding for Azure resources - connect on-premises computers - connect AWS cloud resources - connect GCP cloud resources - configure data collection |
| Manage Microsoft Defender for Cloud alert rules | - validate alert configuration - setup email notifications - create and manage alert suppression rules |
| Configure automation and remediation | - configure automated responses in Microsoft Defender for Cloud - design and configure workflow automation in Microsoft Defender for Cloud - remediate incidents by using Microsoft Defender for Cloud recommendations - create an automatic response using an Azure Resource Manager template |
| Investigate Microsoft Defender for Cloud alerts and incidents | - describe alert types for Azure workloads - manage security alerts - manage security incidents - analyze Microsoft Defender for Cloud threat intelligence - respond to Microsoft Defender Cloud for Key Vault alerts - manage user data discovered during an investigation |
| Mitigate threats using Microsoft Sentinel (40-45%) | |
| Design and configure a Microsoft Sentinel workspace | - plan a Microsoft Sentinel workspace - configure Microsoft Sentinel roles - design Microsoft Sentinel data storage - configure security settings and access for Microsoft Sentinel |












| Welcome Firefly Open Source Community (https://bbs.t-firefly.com/) | Powered by Discuz! X3.1 |