O'Reilly logo

Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD by Robert Mazzoli, Jeff Gilbert, Yuri Diogenes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Implementing Microsoft Advanced Threat Analytics

Image Scenario requirements for on-premises protection

Image Deploying ATA

Image Setting up the ATA environment

Image Leveraging ATA for threat mitigation and incident response

In Chapter 4, “Introducing Microsoft Advanced Threat Analytics,” you learned how Microsoft Threat Analytics (ATA) can be used to help meet ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required