Event Timeline– Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint

The Event timeline page displays vulnerabilities in the order they were discovered or affected your environment. See Figure 9.38 for an example timeline: Figure 9.38 – Event timeline page Selecting an item on the timeline will display the corresponding CVE information as well as links to any security recommendations. Clicking on the associated security recommendation […]

Network Filter Configuration Profile– Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint

MDE can inspect network traffic and report back to the Microsoft 365 Defender portal. Use the following steps to create a configuration profile that allows the network extension to perform this activity: Next, you’ll create a configuration profile to manage device notifications. Notifications Configuration Profile This configuration profile is necessary to allow Intune and MDE […]