Defender Lab Notes 2 (License, Hunting, Vulnerability Management, API, Cross Platform) – 51 Security
Endpoint Detection & Response 1 Proactive hunting Not all threat scenarios begin with an alert Proactive and iterative search for threats The power of knowing the network 2 Enrich existing information Understand the impact of existing alerts Get more information on entities and IOCs 3 Datasets Emails (Defender for Office) Email transactions, including post-delivery Emails attachments and URLs…