Table of Contents
- A Brief History of Microsoft Defender for Endpoint
- Exploring Next-Generation Protection
- Introduction to Attack Surface Reduction
- Understanding Endpoint Detection and Response
- Planning and Preparing for Deployment
- Considerations for Deployment and Configuration
- Managing and Maintaining the Security Posture
- Establishing Security Operations
- Troubleshooting Common Issues
- Reference Guide, Tips, and Tricks

