Microsoft 365 Defender
Virtual Ninja Trainingwith @HeikeRitter
This training series, based on the Ninja blogs, brings you up-to-date quickly on all things Microsoft 365 Defender. In each episode, our experts guide you through the powerful features and functionality of Microsoft Defender products so you can keep your data, endpoints, and users secure. From the fundamentals to deep dives, the show helps you build your knowledge so that you can optimize security for your organization.

Next episode on March 29, 2023
Join us on March 29, 2023 at 9:00AM PT for the next Virtual Ninja Training!
Add to calendar

Download Ninja Cat backgrounds
Add Ninja Cat to your Microsoft Teams meeting using our collection of backgrounds.
Download collectionUpcoming episodes
Attack disruption
Cyber Security Principal Product Manager Hadar Feldman is with us for a comprehensive walkthrough of the many capabilities in Microsoft 365 Defender that help disrupt attacks. Join us to learn more on how Microsoft 365 Defender automatically detects, disrupts, and defends against attacks.
Guest:
Hadar Feldman
Microsoft
Identity threat detection and response
We’re wrapping up season 3 by adding another acronym to your repertoire! Or Tsemah breaks down what identity threat detection and response (ITDR) is and how this tool protects one of our most valuable and difficult-to-protect assets, our identities. Come with us as we dig into the importance of threat detection and response in the Microsoft 365 Defender portal, investigate some cyberattacks, and learn how to identify identities that pose threats to your environment.
Guest:
Or Tsemah
Microsoft
Episodes on demand
SaaS security posture management (SSPM)
Join us as we learn about Microsoft Defender for Cloud Apps SSPM. David Mallett simplifies the initial deployment of this security feature, guides us through the integration of SaaS security and cloud access security brokers, and even explains how to avoid misconfigurations. Tune in to this episode as we learn why security posture is crucial for any organization.
Guest:
David Mallet
Microsoft
Mobile Threat Defense
Product expert, Yuji Aoki, shares key threat defense capabilities within Microsoft Defender for Endpoint for iOS and Android. From a complete onboarding walkthrough to a live demo to showcase the user experience, don’t miss these insights on how to best protect your mobile devices.
Guest:
Yuji Aoki
Microsoft
Defender Experts for Hunting Overview
Learn about Microsoft Defender Experts for Hunting—a service that proactively looks for threats 24/7/365, prioritizing significant threats and improving your SOC’s overall responsiveness. Join the conversation, where product experts Steve Lee and Elisa Lippincott discuss the Defender Experts for Hunting service and other essential threat-hunting capabilities.
Guest:
Elisa Lippincott
Microsoft
Steve Lee
Microsoft
Microsoft Sentinel integration
Together with Sentinel in the Field host Javier Soriano, we provide an overview of Microsoft Sentinel and discuss the integration points within Microsoft 365 Defender, showcasing bidirectional synchronization of incidents, demonstrating how to stream advanced hunting tables to Microsoft Sentinel, and examining remediation playbooks for Microsoft 365 Defender.
Guest:
Javier Soriano
Microsoft
Mastering Email Authentication and Slashing Overrides Part 2
Dive deeper into Microsoft Defender for Office 365 to better understand the complexities behind false-positives and false-negatives in email. Part 2 of this series outlines practices you can put in place now to prevent malicious, spam, or phishing emails in your environment.
Guest:
Paul Newell
Microsoft
Mastering Email Authentication and Slashing Overrides Part 1
Paul Newell shares the importance of using Microsoft Defender for Office 365 to implement email authentication practices. Find out how poor practices can cause false-positives, how overrides can cause false-negatives, and how standards can affect your organization’s incoming email.
Guest:
Paul Newell
Microsoft
Microsoft 365 Defender MVP special
In this special episode, Heike and colleagues talk with two of our MVPs to discuss their experience as MVPs. They’ll even share tips and tricks so that you can become an MVP, too! This episode is the perfect way to round out the year.
Guests:
Katie Ryckman
Microsoft
Ben Harris
Microsoft
Urja Gandhi
Microsoft
Joe Stocker
MVP
Fabian Bader
MVP
Enterprise IoT overview
Discover how Microsoft Defender for IoT can help enterprises monitor assets and risks across their entire IoT environment. Join us as our expert, Nimrod Aldaag, talks about the lates product capabilities.
Guest:
Nimrod Aldaag
Microsoft
Microsoft Defender for Cloud Apps deep dive
Caroline Lee is back to give you a deeper dive into Microsoft Defender for Cloud Apps, including capabilities such as information protection, user scoring, Advanced Hunting, and app governance. Don’t miss this one!
Guest:
Caroline Lee
Microsoft
Microsoft Defender for Cloud Apps Overview
Caroline Lee joins us to give you a guided tour of Microsoft Defender for Cloud Apps. Learn how discovery works, dive into connectors, learn to define policies, and more.
Guest:
Caroline Lee
Microsoft
Microsoft 365 Defender overview
Microsoft 365 Defender is an integrated, cross-domain threat detection and response solution that provides coordinated, automatic defense to block threats before they become attacks. Join us to get to know the components and capabilities of Microsoft 365 Defender.
Guest:
Kim Kischel
Microsoft
Microsoft Defender for Endpoint on Linux
Resident Microsoft Security expert John Nix discusses the end-to-end process for installing, configuring, and managing Microsoft Defender for Endpoint on the Linux devices in your enterprise that use.
Guest:
John Nix
Microsoft
Spearfishing and phishing defense
Discover the best ways to defend your enterprise email against general and targeted phishing attacks in Microsoft Defender for Office 365.
Guest:
Ben Harris
Microsoft
Microsoft Defender for Endpoint on macOS
Security expert and threat hunter Michael Malone describes the installation, configuration, and management of Microsoft Defender for Endpoint on macOS devices.
Guest:
Michael Melone
Microsoft
Attack simulation training
Attack simulation training is an intelligent phish risk reduction tool that empowers employees to prevent attacks, measures their awareness of phishing risks, and provides actionable insights and recommendations that can change their behavior. Learn how to use attack simulation training right in Microsoft Defender for Office 365.
Guest:
Brandon Koeller
Microsoft
Threat and vulnerability management
Threat and vulnerability management discovers vulnerabilities and misconfigurations on your endpoints and provides actionable insights that help you quickly remediate threats and vulnerabilities in your environment. Learn how you can use the threat and vulnerability management in Microsoft Defender for Endpoint to improve your organization’s security posture.
Guest:
Mark Thomas
Microsoft
Get started with Microsoft Defender for Endpoint
In this episode, we dive into the most common features and scenarios to help get you started fast with your tenant. You get an overview of your control center: the unified Microsoft 365 Defender portal, role-based access control, granting permissions, and the built-in evaluation lab.
Guest:
Dean Pickering
Microsoft
Resources:
Start your trialGet to know Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is a comprehensive solution for preventing, detecting, and automating the investigation of and response to threats against endpoints. Join us for this first episode to get to know Microsoft Defender for Endpoint components and capabilities.
Guest:
John Nix
Microsoft
Resources:
Episode 1 (PPTX)