From the course: Microsoft Security Operations Analyst Associate (SC-200) Exam Tips
Unlock the full course today
Join today to access over 23,400 courses taught by industry experts.
Entra ID Protection (formerly Azure AD Identity Protection) and Microsoft Defender for Identity
“
- [Instructor] Azure AD Identity Protection, and Microsoft Defender for Identity, provide very similar protection for identity and access. Azure AD Identity Protection is used for cloud-native users within Azure AD, while Microsoft Defender for Identity is used for on-premises Active Directory users. Let's start with Microsoft Defender for Identity. Microsoft Defender for Identity is to the on-premises identity infrastructure what Azure AD Identity Protection is to the Azure AD and cloud-native identity infrastructure. Since Azure AD Identity Protection is for cloud-native identities, it is already integrated into Microsoft, so no additional sensors are required. Like Microsoft Defender for Identity, Azure AD Identity Protection requires additional licensing. This includes the same EMS E5 and Microsoft 365 E5 licensing that you need for Microsoft Defender for Identity. You can also simply upgrade the Microsoft Azure AD licensing…
Contents
-
-
What is the security operation analyst exam?
46s
See AlsoWhy you should use Microsoft Defender Antivirus together with Microsoft Defender for Endpoint - Microsoft Defender for EndpointMicrosoft Sentinel vs. Traditional SIEMs | Cloud Direct Learning HubWhat is the different between Defender for Cloud and Defender for Endpoint? - Microsoft Q&AMicrosoft Defender for Cloud - CSPM & CWPP | Microsoft Azure -
What should you know before taking this course?
46s
-
What are XDR, SIEM, and SOAR?
2m 42s
-
-
-
Using the Microsoft 365 Defender portal
3m 55s
- (Locked)
Using Microsoft Defender for Office 365
4m 9s
- (Locked)
Using Microsoft Defender for Endpoint
3m 56s
- (Locked)
Entra ID Protection (formerly Azure AD Identity Protection) and Microsoft Defender for Identity
2m 49s
- (Locked)
Microsoft 365 Defender threat monitoring and management
4m 27s
- (Locked)
Demo: Microsoft 365 Defender
3m 53s
-
-
-
Microsoft Defender for Cloud implementation
6m 26s
- (Locked)
Microsoft Defender for Cloud for workloads and multi-cloud
5m 8s
- (Locked)
Demo: Microsoft Defender for Cloud implementation
3m 44s
- (Locked)
Microsoft Defender for Cloud automated remediation
5m 36s
- (Locked)
Microsoft Defender for Cloud monitoring and response
3m 57s
- (Locked)
Demo: Microsoft Defender for Cloud alerts and response
4m 3s
-
-
- (Locked)
Design and configure a Microsoft Sentinel workspace
3m 49s
- (Locked)
Implement data connectors for Microsoft Sentinel
3m 16s
- (Locked)
Demo: Microsoft Sentinel setup demo
5m 30s
- (Locked)
Microsoft Sentinel analytics rules, queries, and alerts
3m 51s
- (Locked)
Microsoft Sentinel orchestration and automation
3m 40s
- (Locked)
Demo: Microsoft Sentinel analytics and automation
2m 43s
- (Locked)