Microsoft Defender for Identity Ninja Training

Published Feb 24 2021 09:00 AM 39.9K Views
Microsoft

Microsoft Defender for Identity Ninja Training


Welcome to the Microsoft Defender for Identity Ninja Training!

 

Microsoft Defender for Identity (renamed from Azure Advanced Threat Protection or Azure ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.  This Ninja blog covers the features, detentions, and functions of Microsoft Defender for Identity.

 

Short Link:  aka.ms/MDINinja

 

In addition, after each level, we offer you a knowledge check based on the training material you have just finished! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun certificate issued at the end of the training: Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.

 

In terms of overall structuring, the training sessions are split into three different knowledge levels:

 

Module

Description

Level 1: Beginner (Fundamentals)

Introduction to Microsoft Defender for Identity, and planning your Deployment.

Level 2: Intermediate (Associate)

Identity Security Posture Assessments, Investigate Lateral Movement Paths, Indicators of compromise

Level 3: Advanced (Expert)

Advanced Hunting with Microsoft 365 Defender

 

Legend/Acronyms

(D)

Microsoft Documentation

(V)

Video

(G)

Interactive Guide

(B)

Blog

MCAS

Microsoft Cloud App Security

RBAC

Role-based access control

MDI

Microsoft Defender for Identity

AATP

Azure Advanced Threat Protection

ATP

Advanced Threat Protection

AIP

Azure Information Protection

ASC

Azure Security Center

AAD

Azure Active Directory

CASB

Cloud Access Security Broker

MTP

Microsoft Threat Protection

GCC

Government Community Cloud

GCC-H

Government Community Cloud High


Note: Threat protection product names from Microsoft are changing. Read more about this and other updates here. We'll be updating names in products and in the docs soon.

 

  • Microsoft 365 Defender (previously Microsoft Threat Protection)
  • Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection)
  • Microsoft Defender for Office 365 (previously Office 365 Advanced Threat Protection)
  • Microsoft Defender for Identity (previously Azure Advanced Threat Protection)

Fundamentals:

In this module you will familiarize yourself with Microsoft Defender for Identity and its detection capabilities. You will also learn about Microsoft Defender for Identity architecture, deployment options, licensing and the Microsoft Defender for Identity community.

 

The purpose of the Microsoft Defender for Identity Security Alert lab tutorial is to illustrate Defender for Identity's capabilities in identifying and detecting suspicious activities and potential attacks against your network. 

Planning your Microsoft Defender for Identity Deployment

Deploying Microsoft Defender for Identity Deployment

 

Ready for the Fundamentals Knowledge Check?

 

Intermediate:

In this module you will familiarize yourself with Microsoft Defender for Identity Security Posture Assessments, identifying indicators of compromise, suspicious activities and attacks, and lateral movement paths. 

Identity Security Posture Assessments

Identify Suspicious Activities and Advanced Attacks

Investigate Lateral Movement Paths
In this module we will learn what Lateral Movement Paths are, and how to investigate.

Indicators of Compromise

In this module we will investigate users, computers, and entities.  This module includes gathering information around users, computers, and entities.  Investigating activities and resources that may have been accessed.  

Interactive Guides

  • Detect suspicious activity w/Defender for Identity (G)
    • In this interactive guide, you'll learn how to detect suspicious activities and potential attacks on your network with Microsoft Defender for Identity. You'll see how Defender for Identity can help you identify reconnaissance attacks, investigate attacker behavior inside your network, and provide recommendations on reducing domain vulnerabilities.
  • Attack Response: Microsoft Defender for Identity (G)
    • In this interactive guide, you’ll learn how to investigate and respond to attacks with Microsoft Defender for Identity. You’ll see how Microsoft Defender for Identity can help you examine suspicious activities, trace lateral movement, and prevent future breaches.

Ready for the Intermediate Knowledge Check?

 

Advanced:

In this module you will familiarize yourself with Microsoft Defender for Identity Advanced Hunting within the Microsoft 365 Defender portal.


Advanced Hunting with Microsoft 365 Defender
In this module you will create advanced KQL threat-hunting queries.  This module includes Microsoft Defender for Identity advanced KQL threat-hunting queries, and the creation of custom detection rules.

Ready for the Experts Knowledge Check?

 

Once you’ve finished the training and the knowledge checks, please click here to request your certificate (you'll see it in your inbox within 3-5 business days.

26 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-2162989%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2162989%22%20slang%3D%22en-US%22%3E%3CP%3EYESSSSSSS!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2163015%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2163015%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20amazing%2C%20awsome%20work!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2163018%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2163018%22%20slang%3D%22en-US%22%3E%3CP%3EHello%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F314416%22%20target%3D%22_blank%22%3E%40BrandonLawson%3C%2FA%3E%26nbsp%3B%20Great%20work.%20Will%20help%20us%20a%20lot.%3C%2FP%3E%3CP%3EThank%20you%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F708110%22%20target%3D%22_blank%22%3E%40Sarahzin%3C%2FA%3E%26nbsp%3Bfor%20the%20share%20in%20LinkedIn%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2163324%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2163324%22%20slang%3D%22en-US%22%3E%3CP%3EAwesome%20work%20team!%20This%20will%20help%20both%20security%20and%20IT%20Pro.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2166532%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2166532%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20these%20training%20materials.%3CBR%20%2F%3EWill%20they%20also%20be%20available%20in%20Microsoft%20Learn%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2175561%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2175561%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F32638%22%20target%3D%22_blank%22%3E%40Luigi%20Bruno%3C%2FA%3E%26nbsp%3B%20%26nbsp%3BYes%2C%20we%20are%20referencing%20the%20Ninja%20training%20and%20additional%20materials%20at%20the%20new%20Microsoft%20Security%20Technical%20Content%20Library.%26nbsp%3B%26nbsp%3B%3CU%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Faka.ms%252FMicrosoftSecurityTechnicalContentLibrary%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C3084cb6b80d8498dff8408d8dc7bf776%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637501772323908541%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DpZU5OzN7jTG%252FFFHDvU51pcxNQ8FArdkMnbNz428SzFs%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FMicrosoftSecurityTechnicalContentLibrary%3C%2FA%3E%3C%2FU%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2177118%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2177118%22%20slang%3D%22en-US%22%3E%3CP%3EGood.%3CBR%20%2F%3EThank%20you%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F314416%22%20target%3D%22_blank%22%3E%40BrandonLawson%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2199580%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2199580%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F314416%22%20target%3D%22_blank%22%3E%40BrandonLawson%3C%2FA%3E%2C%3CSPAN%3E%26nbsp%3Bforecast%20Knowledge%20Check%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2240129%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2240129%22%20slang%3D%22en-US%22%3E%3CP%3EDo%20we%26nbsp%3B%20have%20any%20certification%2Ftraining%20completion%20certification%20and%20knowledge%20check%20for%20AATP%20Ninja%20%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2242494%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2242494%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F637519%22%20target%3D%22_blank%22%3E%40EltonSancho%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F276809%22%20target%3D%22_blank%22%3E%40Nitish_Anand%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20will%20be%20releasing%20a%20knowledge%20check%5Ccertification%20during%20our%20next%20update%20to%20the%20content.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2244248%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2244248%22%20slang%3D%22en-US%22%3E%3CP%3EWow%2C%20Great%20Job%3C%2FP%3E%0A%3CP%3EThank%20you%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2246212%22%20slang%3D%22es-ES%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2246212%22%20slang%3D%22es-ES%22%3E%3CP%3ECompleted%2C%20I'm%20a%20Ninja%20in%20Microsoft%20Defender%20for%20Identity.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2246846%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2246846%22%20slang%3D%22en-US%22%3E%3CP%3EYes!%20go!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2268280%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2268280%22%20slang%3D%22en-US%22%3E%3CP%3EJust%20finished%20making%20my%20way%20through%20this.%26nbsp%3B%20Really%20cool%20learning%20plan%20and%20consolidation%20of%20the%20key%20docs.%26nbsp%3B%20Thanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2279130%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2279130%22%20slang%3D%22en-US%22%3E%3CP%3ENice!%20Thank%20you!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2317538%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2317538%22%20slang%3D%22en-US%22%3E%3CP%3EAmazing%20work!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2117904%22%20slang%3D%22en-US%22%3EMicrosoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2117904%22%20slang%3D%22en-US%22%3E%3CH2%20class%3D%22lia-align-left%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%20id%3D%22toc-hId--523353186%22%3E%3CFONT%20size%3D%227%22%3E%3CSTRONG%3EMicrosoft%20Defender%20for%20Identity%20%3C%2FSTRONG%3E%3CSTRONG%3ENinja%20Training%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3E%3CBR%20%2F%3EWelcome%20to%20the%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training!%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3EMicrosoft%20Defender%20for%20Identity%20(renamed%20from%20Azure%20Advanced%20Threat%20Protection%20or%20Azure%20ATP)%20is%20a%20cloud-based%20security%20solution%20that%20leverages%20your%20on-premises%20Active%20Directory%20signals%20to%20identify%2C%20detect%2C%20and%20investigate%20advanced%20threats%2C%20compromised%20identities%2C%20and%20malicious%20insider%20actions%20directed%20at%20your%20organization.%26nbsp%3B%20%3CSPAN%20style%3D%22color%3A%20%23333333%3B%20font-family%3A%20SegoeUI%2C%20Lato%2C%20'Helvetica%20Neue'%2C%20Helvetica%2C%20Arial%2C%20sans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant-ligatures%3A%20normal%3B%20font-variant-caps%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20white-space%3A%20normal%3B%20widows%3A%202%3B%20word-spacing%3A%200px%3B%20-webkit-text-stroke-width%3A%200px%3B%20background-color%3A%20%23ffffff%3B%20text-decoration-thickness%3A%20initial%3B%20text-decoration-style%3A%20initial%3B%20text-decoration-color%3A%20initial%3B%20display%3A%20inline%20!important%3B%20float%3A%20none%3B%22%3EThis%20Ninja%20blog%20covers%20the%20features%2C%20detentions%2C%20and%20functions%20of%20Microsoft%20Defender%20for%20Identity.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EShort%20Link%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMDINinja%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eaka.ms%2FMDINinja%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20after%20each%20level%2C%20we%20offer%20you%20a%26nbsp%3B%3CSTRONG%3Eknowledge%20check%26nbsp%3B%3C%2FSTRONG%3Ebased%20on%20the%20training%20material%20you%20have%20just%20finished!%20Since%20there%E2%80%99s%20a%20lot%20of%20content%2C%20the%20goal%20of%20the%20knowledge%20checks%20is%20to%20help%20ensure%20understanding%20of%20the%20key%20concepts%20that%20were%20covered.%20Lastly%2C%20there%E2%80%99ll%20be%20a%20fun%26nbsp%3B%3CSTRONG%3Ecertificate%3C%2FSTRONG%3E%26nbsp%3Bissued%20at%20the%20end%20of%20the%20training%3A%20Disclaimer%3A%26nbsp%3B%3CSTRONG%3EThis%20is%20not%20an%20official%20Microsoft%20certification%20and%20only%20acts%20as%20a%20way%20of%20recognizing%20your%20participation%20in%20this%20training%20content%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20terms%20of%20overall%20structuring%2C%20the%20training%20sessions%20are%20split%20into%20three%20different%20knowledge%20levels%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22width%3A%20700px%3B%22%20width%3D%22700%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312.617px%22%3E%3CP%3E%3CSTRONG%3EModule%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.583px%22%3E%3CP%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312.617px%22%3E%3CP%3ELevel%201%3A%20Beginner%20(%3CSTRONG%3EFundamentals%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.583px%22%3E%3CP%3EIntroduction%20to%20Microsoft%20Defender%20for%20Identity%2C%20and%20planning%20your%20Deployment.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312.617px%22%3E%3CP%3ELevel%202%3A%20Intermediate%20(%3CSTRONG%3EAssociate%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.583px%22%3E%3CP%3EIdentity%20Security%20Posture%20Assessments%2C%20Investigate%20Lateral%20Movement%20Paths%2C%20Indicators%20of%20compromise%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312.617px%22%3E%3CP%3ELevel%203%3A%20Advanced%20(%3CSTRONG%3EExpert%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.583px%22%3E%3CP%3EAdvanced%20Hunting%20with%20Microsoft%20365%20Defender%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22width%3A%20700px%3B%22%20width%3D%22700%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20colspan%3D%222%22%20width%3D%22602.2px%22%3E%3CP%3E%3CSTRONG%3ELegend%2FAcronyms%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3E%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3E%3CSTRONG%3EMicrosoft%20Documentation%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3E%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3E%3CSTRONG%3EVideo%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CSTRONG%3E(G)%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3E%3CSTRONG%3EInteractive%20Guide%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3E%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3E%3CSTRONG%3EBlog%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EMCAS%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EMicrosoft%20Cloud%20App%20Security%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3ERBAC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3ERole-based%20access%20control%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EMDI%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EMicrosoft%20Defender%20for%20Identity%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EAATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EAzure%20Advanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EAdvanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EAIP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EAzure%20Information%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EASC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EAzure%20Security%20Center%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EAAD%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EAzure%20Active%20Directory%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3ECASB%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3ECloud%20Access%20Security%20Broker%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EMTP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EMicrosoft%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EGCC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EGovernment%20Community%20Cloud%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22231.667px%22%3E%3CP%3EGCC-H%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22370.533px%22%3E%3CP%3EGovernment%20Community%20Cloud%20High%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%3CBR%20%2F%3ENote%3A%20Threat%20protection%20product%20names%20from%20Microsoft%20are%20changing.%20Read%20more%20about%20this%20and%20other%20updates%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%3Fp%3D91813%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3Ehere%3C%2FSTRONG%3E%3C%2FA%3E.%20We'll%20be%20updating%20names%20in%20products%20and%20in%20the%20docs%20soon.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMicrosoft%20365%20Defender%20(previously%20Microsoft%20Threat%20Protection)%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Endpoint%20(previously%20Microsoft%20Defender%20Advanced%20Threat%20Protection)%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Office%20365%20(previously%20Office%20365%20Advanced%20Threat%20Protection)%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Identity%20(previously%20Azure%20Advanced%20Threat%20Protection)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%20id%3D%22toc-hId-167208288%22%3E%3CFONT%20size%3D%226%22%3E%3CSTRONG%3EFundamentals%3A%20%3C%2FSTRONG%3E%3C%2FFONT%3E%3CU%3E%3C%2FU%3E%3C%2FH3%3E%0A%3CP%3EIn%20this%20module%20you%20will%20familiarize%20yourself%20with%20Microsoft%20Defender%20for%20Identity%20and%20its%20detection%20capabilities.%20You%20will%20also%20learn%20about%20Microsoft%20Defender%20for%20Identity%20architecture%2C%20deployment%20options%2C%20licensing%20and%20the%20Microsoft%20Defender%20for%20Identity%20community.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DxQzzXQU_7AU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EWhat%20is%20Microsoft%20Defender%20for%20Identity%3F%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Ftechnical-faq%23licensing-and-privacy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUnderstanding%20Microsoft%20Defender%20for%20Identity%20Licensing%3C%2FA%3E%3CSPAN%3E%20and%20Privacy%3C%2FSPAN%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmicrosoft-365-defender-enriches-the-microsoft-defender-for%2Fba-p%2F1808275%23%3A~%3Atext%3DMicrosoft%2520Defender%2520for%2520Identity%2520with%2520Microsoft%2520365%2520Defender%2Cand%2520activities%2520across%2520all%2520Microsoft%2520365%2520Defender%2520products.%22%20target%3D%22_blank%22%3EMicrosoft%20365%20Defender%20enriches%20the%20Microsoft%20Defender%20for%20Identity%20experience%3C%2FA%3E%3CSTRONG%3E%20(B)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-identity%2Fbd-p%2FAzureAdvancedThreatProtection%22%20target%3D%22_blank%22%3EDefender%20for%20Identity%20Community%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3CUL%3E%0A%3CLI%3EThis%20is%20a%20Microsoft%20Defender%20for%20Identity%20Tech%20Community%20space%20that%20provides%20an%20opportunity%20to%20connect%20and%20discuss%20the%20latest%20news%2C%20updates%2C%20and%20best%20practices%20with%20Microsoft%20professionals%20and%20peers.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fplaybook-lab-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDefender%20for%20Identity%20Security%20Lab%20and%20Playbooks%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3EThe%20purpose%20of%20the%20Microsoft%20Defender%20for%20Identity%20Security%20Alert%20lab%20tutorial%20is%20to%20illustrate%26nbsp%3B%3CSTRONG%3EDefender%20for%20Identity%3C%2FSTRONG%3E's%20capabilities%20in%20identifying%20and%20detecting%20suspicious%20activities%20and%20potential%20attacks%20against%20your%20network.%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fplaybook-setup-lab%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELab%20Setup%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fplaybook-reconnaissance%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EReconnaissance%20Playbook%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fplaybook-lateral-movement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELateral%20Movement%20Playbook%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fplaybook-domain-dominance%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDomain%20Dominance%20Playbook%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EPlanning%20your%20Microsoft%20Defender%20for%20Identity%20Deployment%3CBR%20%2F%3E%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Farchitecture%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%20Architecture%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fprerequisites%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%20Prerequisites%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Ftechnical-faq%23deployment%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20identity%20FAQs%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EDeploying%20Microsoft%20Defender%20for%20Identity%20Deployment%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dk2PpzgjROLM%26amp%3Bt%3D321s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%20Installation%20Overview%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finstall-step1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECreate%20your%20Azure%20ATP%20instance%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finstall-step2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConnect%20to%20Active%20Directory%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finstall-step3%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConfiguring%20the%20Microsoft%20Defender%20for%20Identity%20Sensor%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fexcluding-entities-from-detections%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EExcluding%20entities%20from%20detection's%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fsensitive-accounts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWorking%20with%20sensitive%20accounts%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EReady%20for%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fforms.office.com%252Fr%252FMbANPQEP2Y%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C5a8332efb4014af2ca0508d8f0909f37%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637523851220503238%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3D3rC%252BrRP2VSYqNIE4Puj25r7MPuzRVLAfAEDyBKHeRgU%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EFundamentals%20Knowledge%20Check%3F%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%20id%3D%22toc-hId-1953656543%22%3E%3CFONT%20size%3D%226%22%3E%3CSTRONG%3EIntermediate%3A%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EIn%20this%20module%20you%20will%20familiarize%20yourself%20with%20Microsoft%20Defender%20for%20Identity%20Security%20Posture%20Assessments%2C%20identifying%20indicators%20of%20compromise%2C%20suspicious%20activities%20and%20attacks%2C%20and%20lateral%20movement%20paths.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EIdentity%20Security%20Posture%20Assessments%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dk0HhkfuS4AY%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EIdentity%20Security%20Posture%20Assessments%20Overview%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dnx5rrxVuRTk%26amp%3Bt%3D754s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EBolster%20your%20security%20posture%20with%20Identity%20Security%20Posture%20Assessments%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fisp-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIdentity%20Security%20Posture%20Assessments%20Documentation%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EIdentify%20Suspicious%20Activities%20and%20Advanced%20Attacks%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FyX4tC6l-oCo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%20Detection's%20%E2%80%93%20Part%201%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2Fb2Cm1EFiejw%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%20Detection's%20%E2%80%93%20Part%202%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Freconnaissance-alerts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EReconnaissance%20Alerts%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fcompromised-credentials-alerts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECompromised%20Credential%20Alerts%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Flateral-movement-alerts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELateral%20Movement%20Alerts%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fdomain-dominance-alerts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDomain%20Dominance%20Alerts%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fexfiltration-alerts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EExfiltration%20Alerts%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EInvestigate%20Lateral%20Movement%20Paths%20%3C%2FU%3E%3C%2FSTRONG%3E%3CBR%20%2F%3EIn%20this%20module%20we%20will%20learn%20what%20Lateral%20Movement%20Paths%20are%2C%20and%20how%20to%20investigate.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fuse-case-lateral-movement-path%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWhat%20is%20a%20Lateral%20Movement%20Path%3F%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finvestigate-lateral-movement-path%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%20Use%20Lateral%20Movement%20Paths%20(LMPs)%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3E%3CU%3E%3CSTRONG%3EIndicators%20of%20Compromise%3C%2FSTRONG%3E%3C%2FU%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20module%20we%20will%20investigate%20users%2C%20computers%2C%20and%20entities.%26nbsp%3B%20This%20module%20includes%20gathering%20information%20around%20users%2C%20computers%2C%20and%20entities.%26nbsp%3B%20Investigating%20activities%20and%20resources%20that%20may%20have%20been%20accessed.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DgeWU4It6S48%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EIncident%20investigation%20with%20Microsoft%20Defender%20for%20identity%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finvestigate-a-user%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%20Investigate%20a%20user%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finvestigate-a-computer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%20Investigate%20a%20computer%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Finvestigate-entity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%20Investigate%20an%20entity%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EInteractive%20Guides%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FDetect%252520suspicious%252520activities%252520and%252520potential%252520attacks%252520with%252520Microsoft%252520Defender%252520for%252520Identity%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C00ec46e62841482afbe108d86f91bbb6%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637382018991896205%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DguG7wiFQbVUd%252BoYk4c%252FV7fabtlqq0CYr21buFxeuCRk%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDetect%20suspicious%20activity%20w%2FDefender%20for%20Identity%3C%2FA%3E%20%3CSTRONG%3E(G)%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CUL%3E%0A%3CLI%3EIn%20this%20interactive%20guide%2C%20you'll%20learn%20how%20to%20detect%20suspicious%20activities%20and%20potential%20attacks%20on%20your%20network%20with%20Microsoft%20Defender%20for%20Identity.%20You'll%20see%20how%20Defender%20for%20Identity%20can%20help%20you%20identify%20reconnaissance%20attacks%2C%20investigate%20attacker%20behavior%20inside%20your%20network%2C%20and%20provide%20recommendations%20on%20reducing%20domain%20vulnerabilities.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FInvestigate%252520and%252520respond%252520to%252520attacks%252520with%252520Microsoft%252520Defender%252520for%252520Identity%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C00ec46e62841482afbe108d86f91bbb6%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637382018991906200%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DI7got7taBfALdaYPhRznYwBbDvso2ly8BvLEwnqXpr4%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAttack%20Response%3A%20Microsoft%20Defender%20for%20Identity%3C%2FA%3E%20%3CSTRONG%3E(G)%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CUL%3E%0A%3CLI%3EIn%20this%20interactive%20guide%2C%20you%E2%80%99ll%20learn%20how%20to%20investigate%20and%20respond%20to%20attacks%20with%20Microsoft%20Defender%20for%20Identity.%20You%E2%80%99ll%20see%20how%20Microsoft%20Defender%20for%20Identity%20can%20help%20you%20examine%20suspicious%20activities%2C%20trace%20lateral%20movement%2C%20and%20prevent%20future%20breaches.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EReady%20for%20the%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fforms.office.com%252Fr%252Fvh6yDwP8Q6%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C5a8332efb4014af2ca0508d8f0909f37%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637523851220513228%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DCvi4J3mYQdIs2ZQSff1HWLc0sIhPBSSV3UNq3QAXKac%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EIntermediate%20Knowledge%20Check%3F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%20id%3D%22toc-hId-146202080%22%3E%3CSTRONG%3EAdvanced%3C%2FSTRONG%3E%3A%3C%2FH1%3E%0A%3CP%3EIn%20this%20module%20you%20will%20familiarize%20yourself%20with%20Microsoft%20Defender%20for%20Identity%20Advanced%20Hunting%20within%20the%20Microsoft%20365%20Defender%20portal.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3E%3CU%3EAdvanced%20Hunting%20with%20Microsoft%20365%20Defender%3C%2FU%3E%3C%2FSTRONG%3E%3CBR%20%2F%3EIn%20this%20module%20you%20will%20create%20advanced%20KQL%20threat-hunting%20queries.%26nbsp%3B%20This%20module%20includes%20Microsoft%20Defender%20for%20Identity%20advanced%20KQL%20threat-hunting%20queries%2C%20and%20the%20creation%20of%20custom%20detection%20rules.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D8Gt5nOFQVrY%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%20advanced%20KQL%20threat-hunting%20queries%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fenhancing-microsoft-defender-for-identity-data-using-microsoft%2Fba-p%2F2178286%22%20target%3D%22_blank%22%3EEnhancing%20Microsoft%20Defender%20for%20Identity%20Data%20Using%20Microsoft%20365%20Defender%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EReady%20for%20the%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fforms.office.com%252Fr%252FA7TfX7JbAY%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C5a8332efb4014af2ca0508d8f0909f37%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637523851220523224%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DQZkUbCfh14odvACd0OItXq2sLt46p%252BgrIiBgpeZju3Y%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EExperts%20Knowledge%20Check%3F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20you%E2%80%99ve%20finished%20the%20training%20and%20the%20knowledge%20checks%2C%20please%3CSTRONG%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fforms.office.com%252Fr%252F1NvVWRbqMB%26amp%3Bdata%3D04%257C01%257CBrandon.Lawson%2540microsoft.com%257C5a8332efb4014af2ca0508d8f0909f37%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637523851220523224%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DdbxWYIGFgyYbVhGhRhsGBm9YuMdAhJC6jdA%252F%252FANHipc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eclick%20here%3C%2FA%3E%26nbsp%3Bto%20request%20your%20certificate%3C%2FSTRONG%3E%26nbsp%3B(you'll%20see%20it%20in%20your%20inbox%20within%203-5%20business%20days.%3CSTRONG%3E%E2%80%9C%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2117904%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Defender%20for%20Identity%20identifies%2C%20detects%2C%20and%20investigates%20advanced%20threats%2C%20compromised%20identities%2C%20and%20malicious%20insider%20actions%20directed%20at%20your%20organization.%26nbsp%3B%20%3CSPAN%20style%3D%22color%3A%20%23333333%3B%20font-family%3A%20SegoeUI%2C%20Lato%2C%20'Helvetica%20Neue'%2C%20Helvetica%2C%20Arial%2C%20sans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant-ligatures%3A%20normal%3B%20font-variant-caps%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20white-space%3A%20normal%3B%20widows%3A%202%3B%20word-spacing%3A%200px%3B%20-webkit-text-stroke-width%3A%200px%3B%20background-color%3A%20%23ffffff%3B%20text-decoration-thickness%3A%20initial%3B%20text-decoration-style%3A%20initial%3B%20text-decoration-color%3A%20initial%3B%20display%3A%20inline%20!important%3B%20float%3A%20none%3B%22%3EDig%20in%20to%20the%20features%2C%20detentions%2C%20and%20functions%20of%20Microsoft%20Defender%20for%20Identity.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2117904%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Identity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2364343%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2364343%22%20slang%3D%22en-US%22%3E%3CP%3Elove%20it%20-%20great%20work%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2511749%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2511749%22%20slang%3D%22en-US%22%3E%3CP%3EGood%20work%20Team.%20This%20will%20be%20helpful%20for%20everyone%20who%20wants%20to%20learn%20Defender.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2513995%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2513995%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20content%2C%20thanks%20!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514949%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514949%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20Content%2C%20Thanks%20for%20sharing%20this%20!!!!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2523978%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2523978%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EGreat%20content%2C%20thanks%20!%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2572503%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2572503%22%20slang%3D%22en-US%22%3E%3CP%3ELab%20environment%20for%20training%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2648174%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2648174%22%20slang%3D%22en-US%22%3E%3CP%3EThat's%20a%20Great%20job%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2648298%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2648298%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20sharing%20these%20valuable%20resources%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2649347%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2649347%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EGreat%20job%2C%20thank%20you%20for%20these%20training%20materials.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2932372%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2932372%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20all%2C%20is%20there%20a%20power%20shell%20script%20or%20an%20efficient%20way%20to%20search%20for%20machines%20in%20the%20MDI%20portal%20so%20that%20my%20customer%20is%20able%20to%20configure%20how%20ADFS%20servers%20resolve%20to%20domain%20controllers%20without%20having%20to%20scroll%20through%20hundreds%20of%20machines%3F%20Initially%2C%20we%20used%20the%20search%20bar%20for%20the%20machine(s)%20but%20it%20did%20not%20resolve%20to%20the%20image%20below.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Shanae1700_0-1636135268352.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F324614i3CA0460337B504E6%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Shanae1700_0-1636135268352.png%22%20alt%3D%22Shanae1700_0-1636135268352.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎May 11 2021 02:04 PM
Updated by:
www.000webhost.com