{"id":404,"date":"2024-03-09T06:46:37","date_gmt":"2024-03-09T06:46:37","guid":{"rendered":"https:\/\/hackmybox.com\/?p=404"},"modified":"2024-08-15T06:51:17","modified_gmt":"2024-08-15T06:51:17","slug":"setup-microsoft-defender-for-endpoint-part-1","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2024\/03\/09\/setup-microsoft-defender-for-endpoint-part-1\/","title":{"rendered":"Microsoft Defender For Endpoint Part 1"},"content":{"rendered":"\n<p><strong>Installing Windows Defender and Examining Vulnerabilities<\/strong><\/p>\n\n\n\n<p>Overview : Defender for Endpoint, Microsoft&#8217;s enterprise security platform, integrates endpoint behavioral sensors within Windows, cloud security analytics, and threat intelligence to detect and respond to advanced threats by translating behavioral signals into actionable insights and alerts.<\/p>\n\n\n\n<p>1.Sign up for a trial from the link provided:<\/p>\n\n\n\n<p>https:\/\/signup.microsoft.com\/create-account\/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&#038;ru=https:\/\/aka.ms\/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink<\/p>\n\n\n\n<p>2. Click on &#8220;Security&#8221; from the Microsoft Admin Center.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"446\" height=\"411\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-29.png\" alt=\"\" class=\"wp-image-405\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-29.png 446w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-29-300x276.png 300w\" sizes=\"auto, (max-width: 446px) 100vw, 446px\" \/><\/figure>\n\n\n\n<p>3. Add devices by navigating to Settings -&gt; Endpoints.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"664\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-30.png\" alt=\"\" class=\"wp-image-406\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-30.png 975w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-30-300x204.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-30-768x523.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>4. Under Device Management -&gt; Onboarding, select the deployment method; for simplicity, download the onboarding package.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"616\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-31.png\" alt=\"\" class=\"wp-image-407\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-31.png 975w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-31-300x190.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-31-768x485.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>5. Execute the script on the target machine..<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"339\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-32.png\" alt=\"\" class=\"wp-image-408\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-32.png 975w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-32-300x104.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-32-768x267.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>6. Once installed on the target machine, locate it under Devices; click on the device name to discover vulnerabilities.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"463\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-33.png\" alt=\"\" class=\"wp-image-409\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-33.png 975w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-33-300x142.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-33-768x365.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>7. Click on &#8220;Discovered Vulnerabilities.&#8221;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"524\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-34.png\" alt=\"\" class=\"wp-image-410\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-34.png 975w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-34-300x161.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-34-768x413.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>8. Select the vulnerability you want to investigate.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"816\" height=\"511\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-35.png\" alt=\"\" class=\"wp-image-411\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-35.png 816w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-35-300x188.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-35-768x481.png 768w\" sizes=\"auto, (max-width: 816px) 100vw, 816px\" \/><\/figure>\n\n\n\n<p>9. A flyout panel containing the CVE details will appear; click &#8220;Go to related security recommendation.&#8221;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"923\" height=\"652\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-36.png\" alt=\"\" class=\"wp-image-412\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-36.png 923w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-36-300x212.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-36-768x543.png 768w\" sizes=\"auto, (max-width: 923px) 100vw, 923px\" \/><\/figure>\n\n\n\n<p>10.Check &amp; perform recommended action.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"564\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-37.png\" alt=\"\" class=\"wp-image-413\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-37.png 975w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-37-300x174.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-37-768x444.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Installing Windows Defender and Examining Vulnerabilities Overview : Defender for Endpoint, Microsoft&#8217;s enterprise security platform, integrates endpoint behavioral sensors within Windows, cloud security analytics, and threat intelligence to detect and respond to advanced threats by translating behavioral signals into actionable insights and alerts. 1.Sign up for a trial from the link provided: https:\/\/signup.microsoft.com\/create-account\/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&#038;ru=https:\/\/aka.ms\/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink 2. Click [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":784,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[12],"tags":[],"class_list":["post-404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":5,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/404\/revisions"}],"predecessor-version":[{"id":786,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/404\/revisions\/786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/784"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}