{"id":9942,"date":"2025-04-30T09:00:00","date_gmt":"2025-04-30T07:00:00","guid":{"rendered":"https:\/\/aboveit.fi\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/"},"modified":"2025-12-01T15:06:01","modified_gmt":"2025-12-01T13:06:01","slug":"microsoft-365-tutorial-video-part-1-defender-for-endpoint","status":"publish","type":"post","link":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/","title":{"rendered":"Microsoft 365 Tutorial Video &#8211; Part 1 &#8211; Defender for Endpoint"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9942\" class=\"elementor elementor-9942 elementor-6719\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-969d0b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"969d0b0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-462aa62\" data-id=\"462aa62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea8adac elementor-widget elementor-widget-text-editor\" data-id=\"ea8adac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>During spring 2025, Above IT will release a series of tutorial videos on Microsoft 365 technologies. In the first part of the tutorial series, Above IT &#8216;consigliere&#8217; Lauri Haveri explores Defender for Endpoint technology &#8211; centralized endpoint security enabled by the Microsoft 365 environment. We will be releasing similar tutorial videos monthly &#8211; much to the delight of your IT management!  <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-761b42a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"761b42a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-657741f\" data-id=\"657741f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e283046 elementor-widget elementor-widget-heading\" data-id=\"e283046\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Defender for Endpoint<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-185e5a72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"185e5a72\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62d26a1f\" data-id=\"62d26a1f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76b6f24d elementor-widget elementor-widget-text-editor\" data-id=\"76b6f24d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/aboveit.fi\/en\/putting-all-your-cybersecurity-eggs-in-one-basket\/\">&#8220;In my opinion, it&#8217;s not wise to put all your eggs in one basket&#8221;<\/a> is a very common comment heard from experienced IT professionals regarding Defender for Endpoint technologies. Does this sound familiar? <\/p><p>However, when you delve a little deeper into Defender technology, typically the third-party security product steps aside, and the security of the Microsoft 365 ecosystem is utilized more effectively! <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/09\/25\/microsoft-is-named-a-leader-in-the-2024-gartner-magic-quadrant-for-endpoint-protection-platforms\/\">After all, Microsoft hasn&#8217;t spent billions on developing its security ecosystem for nothing.<\/a><\/p><p>The Microsoft 365 ecosystem provides comprehensive EDR protection for endpoints and XDR security for the entire IT environment, starting from the Business Premium license level, which has only recently been fully realized. So don&#8217;t let your IT management sleep through this development. <\/p><p>Check out Lauri&#8217;s tutorial video below, where he demonstrates how easy it is to manage Defender security on the Microsoft 365 public cloud&#8217;s Intune endpoint management side. And additional help is closer than you think if needed! <\/p><p>P.S. If the topic interests you further, <a href=\"https:\/\/aboveit.fi\/en\/recording-holistic-cybersecurity-webinar\/\">check out our upcoming webinar on the topic!<\/a> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-05ee321 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"05ee321\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70fc777\" data-id=\"70fc777\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b729dd elementor-widget elementor-widget-video\" data-id=\"4b729dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/OA8WXdAndLM&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2b7adb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2b7adb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-59ce4e7\" data-id=\"59ce4e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b06d303 elementor-widget elementor-widget-text-editor\" data-id=\"b06d303\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Above IT is your IT management partner. If your cybersecurity needs enhancement and you want to utilize your existing Microsoft 365 licenses more effectively, we are the right partner to assist your IT management on this path. So, book a short meeting below, and let&#8217;s assess your organization&#8217;s needs together!  <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>During spring 2025, Above IT will release a series of tutorial videos on Microsoft 365 technologies. In the first part of the tutorial series, Above IT &#8216;consigliere&#8217; Lauri Haveri explores Defender for Endpoint technology &#8211; centralized endpoint security enabled by the Microsoft 365 environment. We will be releasing similar tutorial videos monthly &#8211; much to [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8426,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[218,236],"tags":[219,483,237,238],"class_list":["post-9942","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-microsoft-365","tag-cybersecurity","tag-defender","tag-microsoft365","tag-tutorial-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft 365 Tutorial Video - Part 1 - Defender for Endpoint - Above IT Oy<\/title>\n<meta name=\"description\" content=\"Defender for Endpoint, does it provide comprehensive security? In our first Microsoft 365 tutorial video, Lauri explores the secrets of Defender!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft 365 Tutorial Video - Part 1 - Defender for Endpoint - Above IT Oy\" \/>\n<meta property=\"og:description\" content=\"Defender for Endpoint, does it provide comprehensive security? In our first Microsoft 365 tutorial video, Lauri explores the secrets of Defender!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/\" \/>\n<meta property=\"og:site_name\" content=\"Above IT Oy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aboveitfi\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-30T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-01T13:06:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aboveit.fi\/wp-content\/uploads\/2025\/01\/AboveIT-45-Edit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lauri Haveri\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lauri Haveri\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/\"},\"author\":{\"name\":\"Lauri Haveri\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/ccab7bbd509a621c3089da04fee079cf\"},\"headline\":\"Microsoft 365 Tutorial Video &#8211; Part 1 &#8211; Defender for Endpoint\",\"datePublished\":\"2025-04-30T07:00:00+00:00\",\"dateModified\":\"2025-12-01T13:06:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/\"},\"wordCount\":298,\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AboveIT-45-Edit.jpg\",\"keywords\":[\"cybersecurity\",\"Defender\",\"microsoft365\",\"tutorial video\"],\"articleSection\":[\"Cybersecurity\",\"Microsoft 365\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/\",\"name\":\"Microsoft 365 Tutorial Video - Part 1 - Defender for Endpoint - Above IT Oy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AboveIT-45-Edit.jpg\",\"datePublished\":\"2025-04-30T07:00:00+00:00\",\"dateModified\":\"2025-12-01T13:06:01+00:00\",\"description\":\"Defender for Endpoint, does it provide comprehensive security? In our first Microsoft 365 tutorial video, Lauri explores the secrets of Defender!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AboveIT-45-Edit.jpg\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AboveIT-45-Edit.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft 365 Tutorial Video &#8211; Part 1 &#8211; Defender for Endpoint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"name\":\"We Are Above IT\",\"description\":\"Tietohallinnon voimavarakumppani\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\",\"name\":\"Above IT Oy\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"width\":1613,\"height\":383,\"caption\":\"Above IT Oy\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/aboveitfi\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/aboveitfi\",\"https:\\\/\\\/instagram.com\\\/aboveitfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/ccab7bbd509a621c3089da04fee079cf\",\"name\":\"Lauri Haveri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd4f84db64857d6806fe10bff9981a4aa89271293db63f9f36f23ad2fe16f168?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd4f84db64857d6806fe10bff9981a4aa89271293db63f9f36f23ad2fe16f168?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd4f84db64857d6806fe10bff9981a4aa89271293db63f9f36f23ad2fe16f168?s=96&d=mm&r=g\",\"caption\":\"Lauri Haveri\"},\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/author\\\/lauri-haveriaboveit-fi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft 365 Tutorial Video - Part 1 - Defender for Endpoint - Above IT Oy","description":"Defender for Endpoint, does it provide comprehensive security? In our first Microsoft 365 tutorial video, Lauri explores the secrets of Defender!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft 365 Tutorial Video - Part 1 - Defender for Endpoint - Above IT Oy","og_description":"Defender for Endpoint, does it provide comprehensive security? In our first Microsoft 365 tutorial video, Lauri explores the secrets of Defender!","og_url":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/","og_site_name":"Above IT Oy","article_publisher":"https:\/\/www.facebook.com\/aboveitfi","article_published_time":"2025-04-30T07:00:00+00:00","article_modified_time":"2025-12-01T13:06:01+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2025\/01\/AboveIT-45-Edit.jpg","type":"image\/jpeg"}],"author":"Lauri Haveri","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lauri Haveri","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#article","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/"},"author":{"name":"Lauri Haveri","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/ccab7bbd509a621c3089da04fee079cf"},"headline":"Microsoft 365 Tutorial Video &#8211; Part 1 &#8211; Defender for Endpoint","datePublished":"2025-04-30T07:00:00+00:00","dateModified":"2025-12-01T13:06:01+00:00","mainEntityOfPage":{"@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/"},"wordCount":298,"publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"image":{"@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2025\/01\/AboveIT-45-Edit.jpg","keywords":["cybersecurity","Defender","microsoft365","tutorial video"],"articleSection":["Cybersecurity","Microsoft 365"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/","url":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/","name":"Microsoft 365 Tutorial Video - Part 1 - Defender for Endpoint - Above IT Oy","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#primaryimage"},"image":{"@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2025\/01\/AboveIT-45-Edit.jpg","datePublished":"2025-04-30T07:00:00+00:00","dateModified":"2025-12-01T13:06:01+00:00","description":"Defender for Endpoint, does it provide comprehensive security? In our first Microsoft 365 tutorial video, Lauri explores the secrets of Defender!","breadcrumb":{"@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#primaryimage","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2025\/01\/AboveIT-45-Edit.jpg","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2025\/01\/AboveIT-45-Edit.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/aboveit.fi\/en\/microsoft-365-tutorial-video-part-1-defender-for-endpoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/aboveit.fi\/en\/"},{"@type":"ListItem","position":2,"name":"Microsoft 365 Tutorial Video &#8211; Part 1 &#8211; Defender for Endpoint"}]},{"@type":"WebSite","@id":"https:\/\/aboveit.fi\/en\/#website","url":"https:\/\/aboveit.fi\/en\/","name":"We Are Above IT","description":"Tietohallinnon voimavarakumppani","publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboveit.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aboveit.fi\/en\/#organization","name":"Above IT Oy","url":"https:\/\/aboveit.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","width":1613,"height":383,"caption":"Above IT Oy"},"image":{"@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/aboveitfi","https:\/\/www.linkedin.com\/company\/aboveitfi","https:\/\/instagram.com\/aboveitfi"]},{"@type":"Person","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/ccab7bbd509a621c3089da04fee079cf","name":"Lauri Haveri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4f84db64857d6806fe10bff9981a4aa89271293db63f9f36f23ad2fe16f168?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4f84db64857d6806fe10bff9981a4aa89271293db63f9f36f23ad2fe16f168?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd4f84db64857d6806fe10bff9981a4aa89271293db63f9f36f23ad2fe16f168?s=96&d=mm&r=g","caption":"Lauri Haveri"},"url":"https:\/\/aboveit.fi\/en\/author\/lauri-haveriaboveit-fi\/"}]}},"_links":{"self":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/comments?post=9942"}],"version-history":[{"count":1,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9942\/revisions"}],"predecessor-version":[{"id":9945,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9942\/revisions\/9945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media\/8426"}],"wp:attachment":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media?parent=9942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/categories?post=9942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/tags?post=9942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}