Introduction

Completed

Suppose you're the security analyst for a medium-sized organization. Your organization is interested in adopting Microsoft Defender for Identity to protect user identities. Decision makers in your organization have asked you to provide an overview of the key information that will help you successfully implement Microsoft Defender for Identity for your organization.

After completing this module, you should be able to:

  • Understand the architecture of Microsoft Defender for Identity
  • Understand capacity planning for Microsoft Defender for Identity
  • Understand the setup process for Microsoft Defender for Identity