Threat Management Plan Part 1: Security Dashboard

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:00
Welcome back, Siberians to the industry. 65 Security Administration. Course
00:05
I'm your figure. Jim Daniels.
00:07
In this video, we're gonna be a Model three. Invest 3 65. Threat protection
00:13
Lesson three Threat management
00:15
are one security dashboard.
00:18
In this lesson, we're gonna go over how the security dashboard provides a quick snapshot in the threats and trends within your organization.
00:26
We're also going to discuss how the dashboard enable security
00:30
analysts to drill down for more details by using the Threat Explorer.
00:35
The security dashboard enables cyst owes and other high level executives the ability to gain broad and deep visibility into the enterprise
00:45
threat. My escape.
00:49
It is found in the security compliance center
00:53
under threat management.
00:54
That's warm
00:56
again. It's a high level snapshot of the landscape management and the effort efficacy of souls.
01:04
To get to it, you need to be a global at man, Security at man,
01:08
Security reader or Global Rio Permission.
01:12
The security trans widget provides quick access to details about training malware that's been caught within the M S versus T found network.
01:22
It's possible there are articles that are only to those trends. And to that malware
01:29
actually describes what of this describes the family, including house. Next, boys delivered halos, executed
01:38
remediation steps and security of days that are available.
01:42
You see this and a lot of a V
01:45
titles toward they. Actually, if they see something off, there's something that's popular and trending. It will give you more of a information based. Wanted.
01:55
Alerce is a feature in the industry £60 of Security and Compliance Center
01:59
that's integrated across several programs,
02:01
including DLP Auditing and Threat Intelligence.
02:05
You create other policies to track things like user and admin activities and data loss incidents
02:12
in the security dash. But we can also see information about weekly threat detections, global weekly threat detection ins,
02:20
some of your top targeted users as well as protection numbers. How well the tools are actually working
02:28
threat explore, enable security analyst and administered drill down, understand details. Relating the threats within the tenant
02:35
provides a color coded chart represents attacks that are targeted and your organization
02:42
with
02:43
alerts is a feature in the M S 3 65 security and Compliance Center
02:47
that is integrated across several programs,
02:51
including DLP
02:52
auditing and threat intelligence. True or false?
02:59
If you said
03:00
you said true most excellent
03:06
to recap The lesson
03:07
Security dashboard enables CIS owes and other executive level people
03:13
ability to gain broad in the visibility into the landscape. It's that
03:17
hi overview toe where you can actually drill down to areas that are of concern.
03:23
The security trans widget provides quick access and details about trending malware. There's been caught within the M S 3 60,000 Network
03:31
Threat Explorer and able security analysts and admits to drill down, understand details
03:38
relating to those grants that are targeting their tenants.
03:42
Thank you for joining me in this lesson. I hope to see for the next one take care.
Up Next
Threat Management Plan Part 2: Threat Investigation and Response
Threat Management Plan Part 3: Advanced Threat Analytics
Mobility Part 1: Mobile App Management
Mobility Part 2: Implementing Mobile Device Management
Mobility Part 3: Enrolling MDM Devices