Banner Image

All Services

Programming & Development Networking, Hardware & System Admin

Configure Microsoft Defender for Endpoin

$20/hr Starting at $50

Project details

✅ Review the requirements✅ Plan your deployment✅ Assign roles and permissions✅ Setup Best practice policies⭐️ Attack surface reduction rules - Configure attack surface reduction rules to constrain software-based risky behaviours and help keep your organization safe.⭐️ Ransomware mitigation - Set up ransomware mitigation by configuring controlled folder access, which helps protect your organization's valuable data from malicious apps and threats⭐️ Network protection - Set up network protection to prevent people in your organization from using applications that access dangerous domains or malicious content on the Internet.⭐️ Web protection - Set up web threat protection to protect your organization's devices from phishing sites, exploit sites, and other untrusted or low-reputation sites.⭐️ Network firewall - Configure your network firewall with rules that determine which network traffic is permitted to come into or go out from your organization's devices.⭐️ Application control - Configure application control rules if you want to allow only trusted applications and processes to run on your Windows devices.✅ As part of the Proof of Concept onboard a maximum of two clients.

About

$20/hr Ongoing

Download Resume

Project details

✅ Review the requirements✅ Plan your deployment✅ Assign roles and permissions✅ Setup Best practice policies⭐️ Attack surface reduction rules - Configure attack surface reduction rules to constrain software-based risky behaviours and help keep your organization safe.⭐️ Ransomware mitigation - Set up ransomware mitigation by configuring controlled folder access, which helps protect your organization's valuable data from malicious apps and threats⭐️ Network protection - Set up network protection to prevent people in your organization from using applications that access dangerous domains or malicious content on the Internet.⭐️ Web protection - Set up web threat protection to protect your organization's devices from phishing sites, exploit sites, and other untrusted or low-reputation sites.⭐️ Network firewall - Configure your network firewall with rules that determine which network traffic is permitted to come into or go out from your organization's devices.⭐️ Application control - Configure application control rules if you want to allow only trusted applications and processes to run on your Windows devices.✅ As part of the Proof of Concept onboard a maximum of two clients.

Skills & Expertise

AmazonApp DevelopmentCiscoCloud ComputingCommunications TechnologyComputer HardwareConcept DevelopmentContent WritingData ManagementLinuxMicrosoftNetworkingPlanningProcess DesignRoutersServer AdministrationVirtualizationWeb DevelopmentWebsite Traffic

0 Reviews

This Freelancer has not received any feedback.