- Видео 134
- Просмотров 879 236
CyberPlatter
США
Добавлен 30 авг 2021
Microsoft Sentinel Tutorial: Introduction, Capabilities, and Architecture | Sentinel Training
Welcome to our Microsoft Sentinel Series! 🚀 Our goal is to help you become an expert in Microsoft Sentinel through practical, hands-on demos.
Microsoft Sentinel Series Playlist: ruclips.net/p/PL2QcdSWyXri0gcsc82EdwfFYNwzv8g8Oq
In this first chapter, we’ll introduce you to Microsoft Sentinel, covering:
What is Microsoft Sentinel?
Key capabilities of Sentinel
Sentinel architecture
Whether you're a beginner or looking to deepen your understanding, this series is designed to provide valuable insights and actionable knowledge. Stay tuned for more chapters packed with demos and in-depth tutorials!
🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated!
#cyberplatter #cybersecu...
Microsoft Sentinel Series Playlist: ruclips.net/p/PL2QcdSWyXri0gcsc82EdwfFYNwzv8g8Oq
In this first chapter, we’ll introduce you to Microsoft Sentinel, covering:
What is Microsoft Sentinel?
Key capabilities of Sentinel
Sentinel architecture
Whether you're a beginner or looking to deepen your understanding, this series is designed to provide valuable insights and actionable knowledge. Stay tuned for more chapters packed with demos and in-depth tutorials!
🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated!
#cyberplatter #cybersecu...
Просмотров: 632
Видео
Complete Mediation - Secure Design Principle | How to Implement Complete Mediation | Prod Security
Просмотров 162Месяц назад
Welcome to CyberPlatter! This is part of our series on Application and Product Security. In this video, we’re exploring the Principle of Complete Mediation, one of the core principles of secure design and architecture. You can find other key security principles covered in the Secure Design Principles playlist. ruclips.net/p/PL2QcdSWyXri3Cv_8qNIdPH1zFRtNTT_AU In this video, we’ll cover: What the...
Design For Failure - Secure Design Principle | How to Implement Design for Failure | Prod Security
Просмотров 195Месяц назад
Welcome to CyberPlatter! This is part of our series on Application and Product Security. In this video, we’re exploring the Principle of Design for Failure, one of the core principles of secure design and architecture. You can find other key security principles covered in the Secure Design Principles playlist. ruclips.net/p/PL2QcdSWyXri3Cv_8qNIdPH1zFRtNTT_AU In this video, we’ll cover: What the...
Economy of Mechanism | Benefits of Economy of Mechanism | How to Implement Economy of Mechanism
Просмотров 2082 месяца назад
Welcome to CyberPlatter! This is part of our series on Application and Product Security. In this video, we’re exploring the Principle of Economy of Mechanism, one of the core principles of secure design and architecture. You can find other key security principles covered in the Secure Design Principles playlist. ruclips.net/p/PL2QcdSWyXri3Cv_8qNIdPH1zFRtNTT_AU In this video, we’ll cover: What t...
Infrastructure as Code | What is Infrastructure as Code | What is IaC | Benefits of IaC | DevSecOps
Просмотров 4292 месяца назад
Welcome to our series on Application and Product Security, and DevSecOps! This video dives into Infrastructure as Code (IaC) and covers the following: ➡️What is Infrastructure as Code (IaC)? ➡️The benefits of Infrastructure as Code (IaC) ➡️Real-world examples of Infrastructure as Code (IaC) in action ➡️Key differences between Infrastructure as Code (IaC) and traditional infrastructure managemen...
Secure Design 101: Understanding the Principle of Least Privilege | Secure Architecture Principle
Просмотров 7253 месяца назад
Welcome to CyberPlatter! This is part of our series on Application and Product Security. In this video, we’re exploring the Principle of Least Privilege, one of the core principles of secure design and architecture. You can find other key security principles covered in the Secure Design Principles playlist. ruclips.net/p/PL2QcdSWyXri3Cv_8qNIdPH1zFRtNTT_AU In this video, we’ll cover: What the Pr...
SOC 2 Compliance | SOC 2 Audit Process | SOC 2 : Audit Process, Benefits & Trust Service Criteria
Просмотров 1,3 тыс.3 месяца назад
In this video, we break down everything you need to know about SOC 2 and the SOC 2 audit process. We'll cover the benefits of SOC 2 certification, explore the Trust Service Criteria, and explain the differences between SOC 1, SOC 2, and SOC 3 reports. You'll also learn about the two types of SOC 2 reports (Type 1 and Type 2) and how to effectively implement controls for SOC 2 compliance. Finall...
DevSecOps | What is DevSecops | What is DevOps | DevSecOps Training | DevOps Training | App Security
Просмотров 9494 месяца назад
Welcome to our series on DevSecOps! In this video, we break down What is DevSecOps and What is DevOps with real-world examples. Whether you're preparing for a DevSecOps, DevOps, or Application Security interview, this video has got you covered! 👉 For more in-depth videos on DevSecOps, check out our playlist here: ruclips.net/p/PL2QcdSWyXri3wuoaFi8t_o56YXpNlejMI Don't forget to like, subscribe, ...
Windows Security: Virus & Threat Protection with Microsoft Defender Antivirus | Real-time Protection
Просмотров 1,3 тыс.5 месяцев назад
Welcome to our Windows Security series! In this video, we dive into Virus & Threat Protection and Microsoft Defender Antivirus (formerly Windows Defender Antivirus). In this video, we'll cover: - What is Virus & Threat Protection? - Introduction to Microsoft Defender Antivirus/Windows Defender Antivirus - Key Features of Virus & Threat Protection: - Real-time protection - Cloud-delivered protec...
Endpoint Security Interview Questions and Answers| Endpoint Protection Interview Questions & Answers
Просмотров 7 тыс.6 месяцев назад
Welcome to our series on Endpoint Security Interview Questions and Answers. This video is part 1, covering essential interview questions and answers related to endpoint protection. Stay tuned for upcoming parts! EDR Interview Questions and Answers: ruclips.net/video/q2r2ZNA4PJY/видео.html Microsoft Defender for Endpoint (MDE) Playlist: ruclips.net/p/PL2QcdSWyXri0-Qb-B_XqMbNpvq_MdRnl6 MITRE ATTA...
CCSP Practice Questions and Answers | CCSP Exam 2024 | CCSP Questions and Answers | CCSP Cert | CCSP
Просмотров 3 тыс.6 месяцев назад
Certified Cloud Security Professional (CCSP) This video contains questions and answers designed to help you prepare for the CCSP exam. The goal is not only to familiarize you with the questions but also to understand the underlying topics. Both correct and incorrect options are thoroughly explained. This is part 1 of the series, with more parts to follow. Subscribe here: ruclips.net/channel/UC7...
CISSP Practice Questions and Answers | CISSP Exam 2024 | CISSP Questions and Answers | CISSP Cert
Просмотров 8 тыс.7 месяцев назад
Certified Information Systems Security Professional This video contains questions and answers designed to help you prepare for the CISSP exam. The goal is not only to familiarize you with the questions but also to understand the underlying topics. Both correct and incorrect options are thoroughly explained. This is part 1 of the series, with more parts to follow. Subscribe here: ruclips.net/cha...
Cloud Security Interview Questions and Answers | Scenario based Cloud Security Interview Questions
Просмотров 13 тыс.7 месяцев назад
Azure Interview Part 1: ruclips.net/video/0EjEty8pKJ4/видео.html Azure Interview Part 2: ruclips.net/video/Q1wJ17sg_pk/видео.html Cyber Security Interview Questions and Answers Playlist: ruclips.net/p/PL2QcdSWyXri3aJkyHa07PN5zMByOAPJVp SOC Interview Questions and Answers: ruclips.net/video/WkXdumD_mjM/видео.html Application Security Playlist: ruclips.net/p/PL2QcdSWyXri1YFAqkgJIiDYnIhmq2nswp CCS...
Microsoft Defender for Endpoint MDE : Submissions Page | Submit Files, Emails, Teams Messages, URLs
Просмотров 1,1 тыс.7 месяцев назад
EDR Interview Questions and Answers: ruclips.net/video/q2r2ZNA4PJY/видео.html Welcome to our series on Microsoft Defender for Endpoint (MDE) - an EDR solution, Endpoint Detection and Response. If you're interested in delving deeper into MDE, check out our playlist containing all related videos. This also includes videos on Microsoft Defender XDR. Feel free to suggest any specific topics or tool...
Microsoft Defender for Endpoint: Automated Investigation and Response| AIR in Microsoft Defender XDR
Просмотров 1,6 тыс.7 месяцев назад
EDR Interview Questions and Answers: ruclips.net/video/q2r2ZNA4PJY/видео.html Response Actions on a Device: ruclips.net/video/5wfh7I1eKnU/видео.html Welcome to our series on Microsoft Defender for Endpoint (MDE) - an EDR solution, Endpoint Detection and Response. If you're interested in delving deeper into MDE, check out our playlist containing all related videos. This also includes videos on M...
SOAR Interview Questions and Answers | Security Orchestration, Automation and Response | SOAR Course
Просмотров 4,1 тыс.7 месяцев назад
SOAR Interview Questions and Answers | Security Orchestration, Automation and Response | SOAR Course
Microsoft Defender for Endpoint MDE: Actions taken on a suspicious file in MDE or MS Defender XDR
Просмотров 1,2 тыс.7 месяцев назад
Microsoft Defender for Endpoint MDE: Actions taken on a suspicious file in MDE or MS Defender XDR
Microsoft Defender for Endpoint MDE: Actions taken on a compromised device in MDE or MS Defender XDR
Просмотров 1,3 тыс.7 месяцев назад
Microsoft Defender for Endpoint MDE: Actions taken on a compromised device in MDE or MS Defender XDR
Microsoft Defender for Endpoint MDE: Live Response | What is Live Response in MDE? MS Defender XDR
Просмотров 1,2 тыс.8 месяцев назад
Microsoft Defender for Endpoint MDE: Live Response | What is Live Response in MDE? MS Defender XDR
Microsoft Defender for Endpoint : Network Protection in MDE | Attack Surface Reduction | ASR Rules
Просмотров 2 тыс.8 месяцев назад
Microsoft Defender for Endpoint : Network Protection in MDE | Attack Surface Reduction | ASR Rules
Azure Interview Questions and Answers| Part 2 | Azure Scenario-Based Interview Questions and Answers
Просмотров 5 тыс.8 месяцев назад
Azure Interview Questions and Answers| Part 2 | Azure Scenario-Based Interview Questions and Answers
Microsoft Defender for Endpoint Tutorial | Microsoft Defender for Endpoint Interview Questions | MDE
Просмотров 14 тыс.8 месяцев назад
Microsoft Defender for Endpoint Tutorial | Microsoft Defender for Endpoint Interview Questions | MDE
PCI DSS (Payment Card Industry Data Security Standard): Control Objectives, Requirements & Levels
Просмотров 2,8 тыс.8 месяцев назад
PCI DSS (Payment Card Industry Data Security Standard): Control Objectives, Requirements & Levels
Microsoft Defender for Endpoint MDE : How to test your antivirus with EICAR test file? AV Detection
Просмотров 1,5 тыс.8 месяцев назад
Microsoft Defender for Endpoint MDE : How to test your antivirus with EICAR test file? AV Detection
Microsoft Defender for Endpoint MDE : Advanced Features| Advanced Features in Microsoft Defender XDR
Просмотров 1,8 тыс.8 месяцев назад
Microsoft Defender for Endpoint MDE : Advanced Features| Advanced Features in Microsoft Defender XDR
Microsoft Defender for Endpoint (MDE) : Device Discovery | How to identify unmanaged devices in MDE?
Просмотров 2,3 тыс.9 месяцев назад
Microsoft Defender for Endpoint (MDE) : Device Discovery | How to identify unmanaged devices in MDE?
Microsoft Defender for Endpoint (MDE) : What is Microsoft Defender for Endpoint? Overview of MDE
Просмотров 2,8 тыс.9 месяцев назад
Microsoft Defender for Endpoint (MDE) : What is Microsoft Defender for Endpoint? Overview of MDE
What is Microsoft Defender XDR? What is Microsoft 365 Defender? What is XDR? Microsoft Defender XDR
Просмотров 7 тыс.9 месяцев назад
What is Microsoft Defender XDR? What is Microsoft 365 Defender? What is XDR? Microsoft Defender XDR
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via Intune? MDE Bulk Onboard
Просмотров 3,9 тыс.9 месяцев назад
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via Intune? MDE Bulk Onboard
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via a Local Script
Просмотров 3,2 тыс.9 месяцев назад
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via a Local Script
Wonderful session detailed explanation. Can you upload the next part it would be very helpful
One of the best video on Cryptography, can I get this whiteboard document please
i'm really thankful for this , wish you'r doing well
Who watching this in 2025 ✋
very nice explanation . thanks lot
Great content and great explanation , never seen a channel with so much rich content on cybersecurity . Good luck and thanks again million .
HI, Don't we create AIR for a particular incident, Let an example if alert "XYZ" is triggered AIR will run for the specific Incident.
Freaking fantastic video! Learned more in this hour than days of other videos. I willtake the areas of interest and do a deep dive. This video is great for context of a topic within the iverall scheme of cloud security.
good
To onboard the devices, we need to create configuration profile ( example Template: MDE ).. But in this video, I do not see that step.. instead has selected EDR policy? how does it relate.. thank you!
very helpful, great work.
Awesome explanations,direct to the point. Thanks for sharing your valuable knowledge.
Very well explained and information ❤ thanks 👍
Thank you very much for the very good video, Its really useful. Please do the part 2 and more videos.
Simply amazing!
Very good collection of information. Btw, can you please slow down the delivery of the content? This will give some time for our brain to grasp it. Thank you 🙏 😊
Thanks!
Thank you for your support! Means a lot. 🙏
This is one of the best CISSP tutorials I came across. It can be easily used outside of CISSP context (ex. Domain 1.2.1 video) if you are interested in better understanding of CIA concepts. Level of details and examples used are outstanding. Thank you and please keep up with awesome content!!
I'm so glad you found it helpful! It’s awesome to hear that you’re using it beyond just the CISSP context!
Waiting for the next part of the microsoft sentinel series. nice training mam
Explained so well and with such simplicity, thank you very much maam🙏🏻🙏🏻🙏🏻
Very Usefull course, Is it possible to share a link for notes please
is cloud security engineer course?
I want explanation about thread hunting with XDR tier 1,2
Excellent way of delivering content.
Thank you!
Great work..
Mam iam from hyderabad naku telugu lo cyber security course kavali...! I wanna cyber security course in telugu...! Can u provide mam...?
Mam please complete this series ...I haven't seen anywhere sentinel over the youtube..thank you so much to start this series .
Can you please do video on casb
Best explanation on YT...all your videos are just a gift for beginners mam..Keep it Up.
Thanks for wasting my time 🙏🏼
### Summary of the Video: Microsoft Defender for Endpoint - Network Protection **Overview of Network Protection:** - Network Protection (NP) in Microsoft Defender for Endpoint (MDE) shields devices from internet-based threats as part of the **Attack Surface Reduction (ASR)** features. - It leverages **Microsoft Defender SmartScreen** to block harmful domains and URLs, extending its protection beyond web browsers to other applications. --- ### **Core Features of Network Protection:** 1. **Web Threat Protection:** Prevents access to malicious websites. 2. **Custom Indicators:** Allows admins to define specific IPs, URLs, or domains to block or allow. 3. **Web Content Filtering:** Blocks access to websites based on categories like gambling, peer-to-peer sharing, or adult content. **Modes of Operation:** - **Audit Mode:** Logs events without blocking access. - **Block Mode:** Actively blocks harmful websites and applications. --- ### **How It Works:** 1. **URL Reputation Scenarios:** - **Good Reputation:** Access is allowed. - **Unknown/Uncertain Reputation:** Access is blocked with an option for the user to unblock temporarily. - **Malicious Reputation:** Access is fully blocked with no unblock option. 2. **Command and Control (C2) Protection:** - Detects and blocks C2 infrastructure used in ransomware or malware attacks. --- ### **Configuration Methods:** 1. **Microsoft Defender Portal:** - Add custom indicators (URLs, domains, or IPs) for blocking or auditing. - Configure web content filtering and threat indicators. 2. **Microsoft Intune:** - Use **Security Baselines** or **Configuration Profiles** to enable Network Protection for specific user/device groups. - Configuration includes options for audit mode, block mode, and custom alerts. 3. **Group Policy:** - Navigate through Windows Components > Microsoft Defender to enable or configure NP. 4. **PowerShell Commands:** - Enable NP: `Set-MPPreference -EnableNetworkProtection Enabled` - Set to Audit Mode: Replace "Enabled" with "AuditMode." 5. **Registry Editor:** - Check or set the NP status under relevant Windows Defender registry paths. 6. **Configuration Manager:** - Configure Network Protection through the endpoint protection settings. --- ### **Testing Network Protection:** - Use Microsoft’s test domain ([smart screen test ratings](www.smartscreentest2.net)) to verify functionality. Enabled NP blocks access to the test page. --- ### **Use Cases and Benefits:** - Prevent phishing scams, malware downloads, and data breaches. - Control access to unsanctioned apps or websites. - Enhance organizational security by detecting and mitigating advanced threats. --- ### **Steps to Enable Network Protection:** 1. Access **Intune Admin Center** or the relevant management tool. 2. Configure policies to include NP in **block mode** for full functionality. 3. Test using a fake domain to verify the setup. 4. Monitor and adjust settings based on organizational needs. --- The video concludes with a request for feedback and suggestions for future topics. Viewers are encouraged to explore the features for better endpoint security and share their learning experience.
Method 2 (using Intune) is an alternative to methods 3 (Group Policy), 4 (PowerShell Commands), 5 (Registry Editor), and 6 (Configuration Manager) because all these methods allow you to enable and configure Network Protection (NP) in different ways. However, method 1 (Microsoft Defender Portal) is focused on managing custom indicators (like adding specific IPs, URLs, or domains for blocking/auditing) and configuring web content filtering, which are different functionalities. These cannot be fully replaced by Intune or the other methods mentioned. Thus: Intune (Method 2): Alternative to methods 3, 4, 5, and 6. Microsoft Defender Portal (Method 1): Complementary to other methods, not replaced by Intune.
Love It ,Hoping to See a Series on KQL Aswell !
Thank you very much
Thank you so much for sharing. Many of us are eagerly waiting for the next part....
Thank you for starting Microsoft sentinel
Thank you for the clear explanation. If possible, could you please explain how to deploy Sentinel with third-party integrations and dashboards? Additionally, I would like to understand how to create playbooks and workbooks, as well as learn the basics of using KQL (Kusto Query Language). Thanks for advance.
pay cheyra ni yavva
Nice video sister. I have a question. Microsoft intune license is mandatory for defender for endpoint?
Nicely explained
Thank you. Very informative. please provide more videos.
hey, how to connect with u ?...I need to take training from u on Azure cloud security
I found this when looking to start threat modeling. This is awesome. There is so much information but with good examples and the voice not hurts.
Please do videos on Policy management in MDE
Nice explanation! Can you make a playlist for the beginners who want exposure to the cyber security?
Great questions and good discussion.
Nice video, if you can add some more live examples or industry selection options thwn it will help more
Very good information
Best explanation
Kindly share your pic beside even if it is a small size. Sweetest voice I ever heard. I love you ma'am
Great videos...one suggestion would be to arrange thenplaylist and keeping the short videos as well as combining videos to make one video for each domain and then a single video for whole ccsp.... it would help your channel to grow faster as it will be easily available in searches and would also help ppl like us who can put the playlist in one shot and dont have to hassle tonfind each domain videos .... best of luck... keep up the good work.... i will be sharing this link on discord and reddit after these changes are made....