Channel Avatar

Jackson Felden - Cloud and Security @UCt62QaVfO3W_O112n4bSADQ@youtube.com

2.2K subscribers - no pronouns :c

Thanks for visiting my channel, I'm a Microsoft MVP and pas


26:39
2.3 - Design - Best practise for full scan, MDE from Zero to Hero
21:08
6.3 Dealing with Ransomware via Sentinel automation, MDE from Zero to Hero
53:23
6.2 Ransomware attack investigation, MDE from Zero to Hero
25:27
6.1 Alerts & incidents management, MDE from Zero to Hero
23:27
2.12 Device auto-tagging via Logic Apps, MDE from Zero to Hero
17:07
2.11 Deploying device tag via portal, GPO and Intune, MDE from Zero to Hero
13:21
2.10 Device tag overview, MDE from Zero to Hero
48:02
5 .1 Migration from 3rd party solution, MDE from Zero to Hero
07:29
8.2 Troubleshooting PowerShell output issue, MDE from Zero to Hero
29:42
8.1 Troubleshooting mode deep dive, MDE from Zero to Hero
16:26
4.4 Onboarding via helper script, MDE from Zero to Hero
17:01
4.3 Onboarding via MEM / Intune, MDE from Zero to Hero
29:19
4.2 Onboarding via GPO and local script, MDE from Zero to Hero
17:18
4.1 Onboarding overview, MDE from Zero to Hero
41:00
3.3 Deploying AV settings via GPO, MDE from Zero to Hero
35:39
3.2 Deploying AV settings via MEM, MDE from Zero to Hero
19:31
1.1 Minimum requirements and licensing, MDE from Zero to Hero
32:08
3.1 Initial setup and advanced settings, MDE from Zero to Hero
36:25
2.1 Design: MDE Settings Management, MDE from Zero to Hero
44:00
1. Product Overview, MDE from Zero to Hero
01:19
Introducing my Defender for Endpoint, from Zero to Hero course
19:27
Implementing FIDO2 authentication for Azure AD users
14:05
Attack Surface Reduction implementation report
29:58
How to implement device auto-tagging on Defender for Endpoint
00:32
Welcome to my cloud & security channel
15:09
Microsoft Defender antivirus health report
11:30
Hunting for ransomware activities with Advanced Hunting
12:53
Commodity vs human-operated ransomware
16:49
Implementing attack surface reduction via group policy
08:31
Understanding Defender for Endpoint client analyzer
44:48
Implementing file and email protection in 3 steps
44:25
How to improve the exposure & device score with ASR (Attack Surface Reduction)
06:25
How to deploy device tags on servers
14:46
Implementing Defender for Endpoint on disconnected devices
07:45
How to deploy device tags with Intune
10:19
How to configure Intune to win over Group Policy
34:47
Using Defender for Endpoint for Deep Ransomware Investigation
08:56
How to detect files containing clear text passwords
05:44
How to detect Ransomware with Defender for Cloud Apps
04:25
How to restore OneDrive from a ransomware attack
15:07
Ransomware Protection: Deploying Controlled Folder Access via Intune
20:18
Safe Links - Configuration, end-user experience and getting reports
17:48
Top 3 Teams reports for IT Admins
06:52
How to create a local admin via Intune
36:21
Communication Compliance & Step by Step for Information Berries Implementation
01:01:03
SECURITY - Magic Summary & Demonstrations for MS-900 - Module 4 exam