Summary

Completed

As a security administrator at Contoso, you've been involved with implementing Microsoft Defender for Cloud Apps to help Contoso meet its security goals. As part of this process, you investigated the use of Defender for Cloud Apps to help detect and identify security threats. To help identify and mitigate threats in your on-premises environment, you decided to integrate Defender for Cloud Apps and Microsoft Defender for Identity.

Now that you've completed this module, you should be able to:

  • Create threat protection policies in Defender for Cloud Apps
  • Integrate Defender for Cloud Apps with Microsoft Defender for Identity
  • Detect threats and manage alerts
  • Detect malware

Learn more