Microsoft Defender XDR: Endpoints and Cloud Apps

1 day
UCSECA3
1 days

Upcoming Sessions

Date:

Format:

Price:

Location:

Book now

Date:

Format:

Price:

Location:

Book now

Date:

Format:

Price:

Location:

Book now

Date:

Format:

Price:

Book now

Interested in a private company training? Request it here.

Not ready to book yet? Request an offer here.

Microsoft Defender for Endpoint

Devices can get compromised because of missing updates or vulnerabilities in applications. Microsoft Defender for Endpoint provides you with an inventory and gives you recommendations to make your environment more secure. This service also detects suspicious activities and alerts you about possible attacks.

  • Protect Your Devices
  • Onboarding Devices
  • Threat and Vulnerability Management
  • Endpoint Detection and Response
  • Device Investigations
  • Automated Investigation and Remediation
  • LAB: Microsoft Defender for Endpoint

Microsoft Defender for Cloud Apps

In this cloud-based world, it can become difficult to find the right balance between flexibility for your users and protecting your critical data. Microsoft Defender for Cloud Apps acts as a gatekeeper to broker access between your users and the cloud apps they use. At the same time, it can safeguard your sensitive information.

  • Cloud Discovery
  • App Connectors
  • Control Access to Apps with Policies
  • Protect Sensitive Information
  • Conditional Access App Control
  • LAB: Microsoft Defender for Cloud Apps

Detect and Stop attacks with Microsoft Defender XDR

So many different tools that collect so much data. You may be flooded with information. Microsoft Defender XDR brings it all together. It gives you better insights in attacks by showing you the devices, identities and apps that were involved. You can hunt for threats and be proactive, making sure the attacker doesn't stand a chance.

  • Microsoft Defender XDR
  • Protect Your Environment
  • Security Recommendations and Secure Score
  • Attack Investigation
  • Threat Hunting
  • LAB: Microsoft Defender XDR

Microsoft Security Copilot

Investigating an attack or writing the ideal Kusto query can be difficult. Microsoft Security Copilot will make your life easier by helping you with the analysis of suspicious scripts, generating a Kusto query or writing a report once an incident has been handled.

  • Investigate Incidents with Copilot
  • Analyze Suspicious Scripts
  • Hunt Like a Pro
  • Copilot Plugins

Attackers often target endpoints and cloud apps to gain a foothold in your environment. Microsoft Defender for Endpoint helps detect and block advanced threats across your devices with behavioral monitoring, endpoint detection and response (EDR), and automated remediation. At the same time, Microsoft Defender for Cloud Apps provides visibility and control over your cloud applications, detecting risky behavior, shadow IT, and data exfiltration attempts. Together, they extend your security posture across the entire digital workspace.

This course is intended for system administrators and security specialists responsible for securing and analyzing the cloud IT environment.

Contact Us
  • Address:
    U2U nv/sa
    Z.1. Researchpark 110
    1731 Zellik (Brussels)
    BELGIUM
  • Phone: +32 2 466 00 16
  • Email: info@u2u.be
  • Monday - Friday: 9:00 - 17:00
    Saturday - Sunday: Closed
Say Hi
© 2025 U2U All rights reserved.